Nikos Laleas & Giuseppe TrottaMay 64 min readWhen "Phish-Proof" Gets HookedIn the digital age, the escalation of phishing attacks has pushed the envelope on the development of more robust security measures....
Giuseppe TrottaMar 29, 20234 min readAiTM vs Two-Factor Authentication (2FA) mechanismsIn this blog post, we will delve into the impact of this novel phishing approach on most two-factor authentication (2FA) mechanisms and high
Giuseppe TrottaMar 17, 20237 min readAiTM (Adversary-in-the-Middle) PhishingAs more and more people rely on digital communication for their everyday lives, the threat of cyber-attacks becomes increasingly significant