Cybersecurity researchers claimed to have found over a thousand phishing toolkits that are able to hack two-factor authentication, allowing hackers to conduct sophisticated attacks on a target system. It is bizarre to admit that most of these MitM phishing toolkits in use by attackers are based on tools developed by researchers themselves. Vulnerable organizations can use a tool called PHOCA to identify a MitM attempt.
- Next story 1.1 million customer accounts compromised from 17 companies
- Previous story New Web Skimmer Campaign Attacks via Cloud Video Distribution Supply Chain
Popular Tags
Attack (594)
attacks (556)
computer security (768)
cyber attacks (769)
cyber news (822)
Cybersecurity (1443)
cyber security news (822)
cyber security news today (822)
cyber security updates (822)
cyber updates (822)
Data (752)
data breach (828)
ethical hacking (902)
hack android (902)
hack app (902)
hacker news (1663)
Hackers (526)
hacking (1225)
hacking news (761)
hacking tools for windows (902)
hack wordpress (902)
how to hack (761)
information security (785)
keylogger (904)
kit (910)
kitploit (902)
Malware (811)
network security (768)
password brute force (902)
penetration testing (904)
pentest (906)
pentest android (902)
pentest linux (902)
pentest toolkit (902)
pentest tools (902)
Phishing (469)
Ransomware (1080)
ransomware malware (761)
security (1196)
software vulnerability (761)
spy tool kit (902)
spyware (959)
the hacker news (762)
tools (957)
vulnerabilities (508)
Best Articles