Recent Blog ArticlesMost RecentMost LikesDetecting AiTM Phishing via 3rd-Party Network events in Unified Security Operations Platform We would like to provide new update on AiTM (Adversary-in-the-Middle) phishing attacks hunting query with the Unified Security Operations Platform. These queries are revised versions from the blog po...Identifying Adversary-in-the-Middle (AiTM) Phishing Attacks through 3rd-Party Network Detection Delve into the intricacies of Adversary-in-the-Middle (AiTM) phishing attacks as we explore the latest trends, threats, and the notorious actor DEV-1101 tracked by Microsoft. Discover the profound im...