Knowledge Base
    1. Remote Browser Isolation
    2. Zero Trust Credentials
    3. Zero Trust Files
    4. Configuring Consents
    5. Overview
    6. Attack Scenarios
    7. Cyber Resillience Report
    8. Configuration
    9. Using with Active Directory

Attack Scenarios

Videos:
  • Why blocking DNS is not sufficient ?
  • MFA breach attack
  • Advanced social engineering attacks
  • Attacker’s console, how do they conduct social engineering attack

Why blocking DNS is not sufficient ?

MFA breach attack

Advanced social engineering attacks

Attacker’s console, how do they conduct social engineering attack

zero trust 9 MFA 2 breach 1 attack 1 AiTM 1 social engineering 1 video 2