Author:
Mishra Sundaram,Mishra Shivam,Toh Yan Chi,Mishra Satyam,Vi Phung Thao
Reference17 articles.
1. Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices
2. MITM Attacks ‐ EvilProxy and Evilginx https://explore.avertium.com/resource/mitm-attacks-evilproxy-and-evilginx(accessed Jul. 10 2023).
3. How to set up Evilginx to phish Office 365 credentials;Bakker J.;JanBakker. tech.,2022
4. Using Security Metrics to Determine Security Program Effectiveness