Mamba 2FA Cybercrime Kit Targets Microsoft 365 Users
A stealthy new underground offering uses sophisticated adversary-in-the-middle (AitM) techniques to convincingly serve up "Microsoft" login pages of various kinds, with dynamic enterprise branding.
The security bugs were found susceptible to exploitation in connection to the previously disclosed, critical CVE-2024-8963 vulnerability in the security vendor's Cloud Services Appliance (CSA).
Aside from being integrated with the firm's Identity Document Verification, Know Your Customer data checks, and Watchlist Screening, Trulioo Fraud Intelligence generates accurate fraud risk scores for organizations through predictive risk...