Despite enterprises' increased use of multi-factor authentication, phishing techniques like adversary-in-the-middle attacks allow attackers to bypass this security feature and steal credentials.
Article Link: Hackers still prefer credentials-based techniques in cloud attacks | SC Media