Skip to content

Details

You might have come across terms like token identity theft, Man-in-the-Middle (MITM) attacks, Adversary-in-the-Middle (AiTM) attacks, or Reverse Proxy Identity Theft. These names all describe the same type of cyberattack, where criminals use tools to intercept communications and deceive users into providing their credentials, including MFA, thereby compromising their accounts.

Most of these attacks target usernames, passwords, and MFA. In fact, Microsoft detected 147,000 token replay attacks last year, a 111% increase from previous years.

Join me to learn more about these threats and how to add protection layers to your tenant!

Meeting ID: 258 059 894 018
Passcode: kL6vX9aY

Cloud Security
Cloud Computing
Microsoft
Modern Workplace

Members are also interested in