Storm-2755 is using adversary-in-the-middle (AiTM) techniques to hijack employee sessions and redirect salary payments to attacker-controlled accounts in Canada. This campaign, which bypasses multi-factor authentication, leverages SEO poisoning and social engineering tactics, making it challenging for organizations to detect and mitigate the threat. Developers and tech professionals should implement robust MFA solutions and continuous access evaluation policies to prevent such attacks.
Read the full article at Cyber Security News
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.

![[AINews] The Unreasonable Effectiveness of Closing the Loop](/_next/image?url=https%3A%2F%2Fmedia.nemati.ai%2Fmedia%2Fblog%2Fimages%2Farticles%2F600e22851bc7453b.webp&w=3840&q=75)



