Research
HIGH Scattered Spider's AiTM Playbook: How They're Bypassing MFA at Scale
An analysis of Scattered Spider's adversary-in-the-middle techniques - the social engineering, the tooling, and why your MFA might not be enough.
scattered-spider aitm phishing
+2
· 6 min read
Read