Technology ❯ Cybersecurity ❯ Phishing ❯ Malware
The tactic bypasses two-factor checks by proxying logins to steal passwords plus session cookies.