According to a recent LinkedIn post from Huntress, the company is observing that roughly one in five cyberattacks it tracks involves adversary‑in‑the‑middle techniques that bypass common two‑factor authentication protections. The post describes how attackers intercept legitimate Microsoft login sessions, capture credentials and session tokens, and then use them to access accounts from other locations.
Claim 55% Off TipRanks
- Unlock hedge fund-level data and powerful investing tools for smarter, sharper decisions
- Discover top-performing stock ideas and upgrade to a portfolio of market leaders with Smart Investor Picks
The company’s LinkedIn post highlights basic defensive measures such as restricting logins from countries where an organization does not do business and blocking unknown locations. For investors, this emphasis on evolving attack vectors and practical controls suggests ongoing demand for advanced threat detection and managed security services, potentially reinforcing Huntress’s positioning in the cybersecurity market as small and mid‑size organizations seek to harden their identity and access management controls.
More broadly, the post suggests that multifactor authentication alone may not be sufficient for enterprises facing sophisticated threats, which could support increased spending on layered security solutions. This environment may create opportunities for Huntress to deepen customer engagements, expand its product offerings around identity protection, and capture a larger share of security budgets as clients respond to adversary‑in‑the‑middle risks.

