Adversary-in-the-middle (AiTM) May 29 12 min read Defending against evolving identity attack techniques Threat actors continue to develop and leverage various techniques that aim to compromise cloud identities.