Live Demo: How Hackers bypass MFA and how you can Protect your Business
Verteks Consulting Verteks Consulting
233 subscribers
467 views
0

 Published On Oct 26, 2023

Do you think having MFA make you safe?
How does an Adversary in the Middle attack work?
Ever wish you could see how hackers use their tools?

We were excited to have our special guest Marc Laliberte, Director of Security Operations at WatchGuard Technologies do the live demo and you’ll leave with an understanding of the latest trends and defensive tips you can take back to keep your organization safe.

Last year, a user on a popular underground marketplace began offering access to what was once a sophisticated social engineering attack technique for a low price. This commoditization of a once-complex tool has lowered the barrier of entry and increased the breadth of potential victims. In this webinar, will walk through the latest trends in social engineering and demo an adversary-in-the-middle attack.

You might be asking what is an Adversary in the Middle attack? An Adversary in the Middle attack (AitM) is a sophisticated threat that allows cyber criminals to intercept network communications. From there, cyber attackers can pinch credentials, copy encryption and identity verification keys, and launch further attacks that can even circumvent multi-factor authentication.

You don't want to miss this webinar presented by one of the industry’s leading speakers. For more about Marc check Secplicity https://www.secplicity.org/ and the 443 Podcast.

For more information or a technical walkthrough of our products please contact us today:
877-Verteks
www.Verteks.com
https://www.verteks.com

show more

Share/Embed