https://www.huntress.com/blog/a-recap-of-events-and-lessons-learned-during-the-kaseya-vsa-supply-chain-attack
Lessons Learned During the Kaseya VSA Supply Chain Attack | Huntress
The Huntress team recaps what happened during the Kaseya VSA supply chain attack—and what we can learn from it.
supply chain attackkaseya vsa
https://www.huntress.com/cybersecurity-101/topic/adversary-in-the-middle-attack
What is an Adversary-in-the-Middle (AiTM) Attack? | Huntress
Learn how AiTM attacks bypass MFA by stealing session cookies through proxy servers. Learn detection methods and defense strategies for this evolving threat.
attack huntressadversaryaitm