LinkedIn AiTM Defense
LinkedIn AiTM phishing — what actually happens, step by step
The attack in plain English. What gets captured, when reCAPTCHA matters, why li_at is the prize, and which …
Microsoft 365 OAuth Consent Defense
OAuth consent phishing against Microsoft 365 — what happens when no password is stolen
The attacker registers an app in their own tenant, tricks a user into clicking Accept, and gets Microsoft-signed …