Authentication Vulnerabilities | Cybersecurity Threats | Phishing Techniques Hackers using specialized phishing tools for downgrade attacks on FIDO authentication
Authentication Vulnerabilities | Lateral Movement Techniques | Tenant Compromise Methods Recent techniques for lateral movement within Active Directory have emerged that circumvent authentication measures and enable data exfiltration.