MFA Cannot Stand Alone Series – AiTM Attacks and How Unixi Deals With Them

As part of our 3-part series on MFA weaknesses, this initial post will delve into the Adversary in the Middle attacks, how they circumvent MFA, and how Unixi stops such attacks in different moments of the attack. But first, some background. Multi Factor Authentication (MFA) is a useful technology that adds security to a credential […]