Phishing 2.0 - Detecting Evilginx, EvilnoVNC, Muraena and Modlishka

Ғылым және технология

Attackers are increasingly using new phishing toolkits (open-source, commercial, and criminal) to execute AitM and BitM attacks and bypass traditional phishing prevention controls such as MFA, EDR, and email content filtering.
They're not only harvesting credentials, but stealing live session logins for high-value platforms like Okta and Microsoft 365.
In this video, Push Security's VP R&D, Luke Jennings, will demo how these tools work as well as how Push uses browser telemetry to detect these toolkits running on webpages and block users from accessing them.

Пікірлер

    Келесі