Alan Security | Dissecting Digital Threats
  • Articles
  • About
Sign in Subscribe

Phishing

The Silent Threat: An Analysis of SVG-Based Phishing Attacks

The Silent Threat: An Analysis of SVG-Based Phishing Attacks

While security professionals have hardened defenses against traditional email threats like macro-enabled documents, a seemingly benign file format is increasingly being exploited to bypass these controls: the Scalable Vector Graphic (SVG).
AlanKaliX 12 Aug 2025
The Shadow in the Stream: Hunting Adversary-in-the-Middle Phishing Attacks with KQL

The Shadow in the Stream: Hunting Adversary-in-the-Middle Phishing Attacks with KQL

Adversary-in-the-Middle (AiTM) phishing poses a significant threat to business operations, particularly in cloud-based environments such as Microsoft 365. This technique involves attackers positioning themselves between users and legitimate services to intercept credentials and session tokens, often bypassing multifactor authentication (MFA). Enterprises face heightened risks due to the integration of AiTM
AlanKaliX 24 Jul 2025

Subscribe to Alan Security | Dissecting Digital Threats

Don't miss out on the latest news.
  • Sign up
Alan Security © 2025. Made with ❤️ Ghost