March 8, 2024, 12:55 p.m. | SC Staff

SC Magazine feed for Strategy www.scmagazine.com

Both Tycoon and Storm-1575 have also been leveraging adversary-in-the-middle phishing to circumvent multifactor authentication protections.

advanced adversary adversary-in-the-middle adversary-in-the-middle phishing attacks authentication email security identity multifactor multifactor authentication phishing schools spearphishing storm storm-1575 target tycoon

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States