raja manisynackwithraj.hashnode.devยทAug 13, 2024Learn like a baby - Vendor Agnostic Hunting approaches for modern authentication abuse using AITM - 3In this blog we have structured this into three parts The Act, The Analysis and The Detection and go through each part in very simplistic way to understand and approach them. The Act talks about Modern authentication abuse using AITM The Analysis t...81 readsCloud Attacks - AzureAitmAdd a thoughtful commentNo comments yetBe the first to start the conversation.