Phishing 2.0: Detecting Evilginx, EvilnoVNC, Muraena & Modlishka
Agenda: Phishing 2.0
Attackers are increasingly using new phishing toolkits (open-source, commercial, and criminal) to execute AitM and BitM attacks and bypass traditional phishing prevention controls such as MFA, EDR, and email content filtering.
They're not only harvesting credentials, but stealing live session logins for high-value platforms like Okta and M365.
In this webinar, our VP R&D, Luke Jennings, demonstrates how these tools work as well as how Push uses browser telemetry to detect these toolkits running on webpages and block users from accessing them.
