Hackers still prefer credentials-based techniques in cloud attacks

Despite enterprises' increased use of multi-factor authentication, phishing techniques like adversary-in-the-middle attacks allow attackers to bypass this security feature and steal credentials.

Article Link: Hackers still prefer credentials-based techniques in cloud attacks | SC Media