Zero-False-Positive Authentication Monitoring Now Available Free for 90 Days, No Commitment as AiTM/Evilginx Attacks Bypass MFA Protections Across the EnterpriseZero-False-Positive Authentication Monitoring Now Available Free for 90 Days, No Commitment as AiTM/Evilginx Attacks Bypass MFA Protections Across the Enterprise

ThreatHunter.ai Announces Free 90-Day MILBERT.ai Access for Qualified Firms

2026/02/07 04:45
3 min read

Zero-False-Positive Authentication Monitoring Now Available Free for 90 Days, No Commitment as AiTM/Evilginx Attacks Bypass MFA Protections Across the Enterprise

BREA, Calif., Feb. 6, 2026 /PRNewswire/ — ThreatHunter.ai, a Service-Disabled Veteran-Owned Small Business providing 24/7 threat hunting services since 2007, today announced that its MILBERT.ai real-time authentication monitoring platform is now available free for 90 days with no commitment required to qualified firms. The decision comes as Adversary-in-the-Middle (AiTM) attacks using tools like Evilginx continue to compromise organizations that believe their Multi-Factor Authentication (MFA) makes them safe. It does not.

MILBERT processes authentication events in real time, currently handling 6,380 authentication events per second per customer with near zero false positives. Unlike traditional security tools that flood SOC teams with alerts they cannot act on, MILBERT identifies actual compromised accounts and credential abuse as it happens, not after the damage is done, and takes immediate action and closes the Threat Actor down.

The MFA Problem Nobody Wants to Talk About

AiTM attacks using frameworks like Evilginx sit between users and their authentication providers. When a user enters their credentials and completes MFA, the attacker captures the session token in real time. The user sees a normal login. The attacker walks right through MFA as if it does not exist. Organizations that spent significant budgets deploying MFA are being breached because they believe the problem is solved. It is not.

“I am watching company after company get breached through AiTM attacks while their security teams tell leadership that MFA has them covered,” said James McMurry, CEO and Founder of ThreatHunter.ai. “MFA is not the finish line. It is a speed bump for attackers using Evilginx. We built MILBERT to catch exactly this, real-time detection of compromised authentication events with zero false positives. If we can help organizations see what is actually happening in their environment before it becomes a breach notification, we are going to do that.”

“From day one, this company has been about one thing, protecting organizations from threat actors who are constantly evolving their tactics,” said Eric Cowperthwaite, COO of ThreatHunter.ai. “We have watched the industry sell MFA as a silver bullet for years while attackers developed tools that go right through it. The reality is that most organizations have no visibility into whether their authenticated sessions are legitimate or hijacked. MILBERT changes that equation completely. Offering 90 days free is not a marketing play. It is consistent with who we have always been.”

How MILBERT Works

MILBERT monitors authentication events in real time across the enterprise environment. It analyzes login patterns, session behavior, and credential usage to identify compromised accounts, token theft, and AiTM attacks as they occur. The platform’s zero false positive track record means that when MILBERT flags an event, security teams can act immediately with confidence rather than chasing phantom alerts.

Qualified firms can deploy MILBERT free for 90 days with no commitment required. There are no feature gates, no sales calls required to get started, and no obligation at the end of the trial.

https://www.threathunter.ai/milbert

About ThreatHunter.ai

ThreatHunter.ai is a Service-Disabled Veteran-Owned Small Business that has provided 24/7 threat hunting services since 2007. The company operates multiple cybersecurity platforms including MILBERT (real-time authentication monitoring), ARGOS (MDR), GEIGER (attack path analysis), TACT-IO (vulnerability scanning), and VIZIUM (network traffic analysis). ThreatHunter.ai serves enterprise clients and is headquartered in Brea, California.

Media Contact:
Greg Nance
408859@email4pr.com
714-515-4011

Cision View original content to download multimedia:https://www.prnewswire.com/news-releases/threathunterai-announces-free-90-day-milbertai-access-for-qualified-firms-302681658.html

SOURCE ThreatHunter.ai

Market Opportunity
FreeRossDAO Logo
FreeRossDAO Price(FREE)
$0.00008877
$0.00008877$0.00008877
-1.27%
USD
FreeRossDAO (FREE) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Trump’s 'desperate' push to rename landmarks for himself is a 'growing problem': analysis

Trump’s 'desperate' push to rename landmarks for himself is a 'growing problem': analysis

President Donald Trump's fixation on adding his name to major landmarks is presenting numerous problems both for himself and his party.That's according to a Friday
Share
Alternet2026/02/07 05:30
Can XRP Repeat Its 300% Surge and Reach $5? Analysts Weigh In

Can XRP Repeat Its 300% Surge and Reach $5? Analysts Weigh In

The post Can XRP Repeat Its 300% Surge and Reach $5? Analysts Weigh In appeared on BitcoinEthereumNews.com. One of the most notable outcomes of the bull run has been the 300% price increase of XRP this year. Investors are wondering if XRP may reach $5 in 2025, given the pace driven by ecosystem improvements, institutional interest, and legal clarity. Numerous analysts hold this view, pointing to significant demand stimulants such as the impending approval of the XRP ETF and the introduction of XRP options on CME. Beyond conjecture, the fundamentals of XRPL are more solid than ever. In just a few months, the network’s TVL increased from $20 million to over $100 million, and cross-chain DeFi applications are becoming more accessible because to EVM compatibility. XRPL is changing into a center for liquidity and intelligent financial solutions as a result of this innovation surge. As the native DEX that XRPL has long required, DeXRP is becoming more and more popular. DeXRP is getting ready to launch as the focal point of XRPL’s new DeFi economy, having already generated over $6.6 million in presale and attracted over 9,500 investors. What is DeXRP?  As the first decentralized exchange (DEX) based on XRPL, DeXRP is taking center stage as XRP continues to solidify its place in the global market. Massive expectation has been generated by the combination of DeXRP’s ambition for an advanced trading platform and XRPL’s established infrastructure, which is renowned for its quick transactions, cheap fees, and institutional-ready capabilities. In contrast to a lot of speculative presales, DeXRP’s development shows both institutional interest and community-driven momentum. Its early achievement of the $6.4 million milestone demonstrates how rapidly investors are realizing its potential. DeXRP Presale Success More than 9,300 distinct wallets have already joined the DeXRP presale, indicating a high level of interest from around the world. A crucial aspect is highlighted by the volume and variety of participation:…
Share
BitcoinEthereumNews2025/09/19 20:01
Crypto Investor Loses $6.28M to Sophisticated Phishing Permit Scam

Crypto Investor Loses $6.28M to Sophisticated Phishing Permit Scam

A cryptocurrency investor recently lost $6.28 million to a sophisticated phishing scam that exploited malicious signature approvals. The incident serves as a significant reminder of the increasing prevalence of “permit phishing” schemes, which pose a serious threat to users in the DeFi ecosystem. Attacker Steals $6.28 Million   The attack began when the victim received a targeted phishing message that appeared to be a legitimate update from a decentralized finance (DeFi) platform. Tempted by offers of better returns, the investor connected their wallet to a fake website. There, they signed an EIP-2612, which includes a feature that allows token approvals without gas fees. However, it can also unintentionally give scammers unlimited spending access to a smart contract.  The theft occurred shortly after the approvals were granted. The scammer quickly executed a contract that drained 3,200 stETH and a matching amount of aEthWBTC from the victim’s wallet. The loot, which was traced to a mixer address, revealed a calculated plan to conceal the trail.  The entire theft took less than 12 minutes, using automated scripts for speed. Scam Sniffer noted that the victim’s portfolio, which was worth over $10 million before the attack, lost half its value immediately. The rapid process allowed no time for intervention, as blockchain transactions cannot be reversed once completed. On-chain analysis indicated that the assets were unlikely to be recovered, as they were likely laundered through exchanges. Not New   Following the exploit, some users on X have expressed shock, wondering how the victim unwittingly signed malicious token approvals. However, this subtle trap has long troubled the crypto space. For instance, earlier this month, a user of Venus Protocol lost $13.5 million. The victim fell prey to a phishing scam by approving a transaction from a malicious Core Pool Comptroller contract, which granted the attacker access to their funds. Once permission was given, the hacker quickly drained stablecoins and wrapped tokens from the trader’s wallet.  Surprisingly, though, a few hours after the incident, the Venus team tracked the stolen funds by force-liquidating the hackers’ trade positions. The team fully recovered the stolen funds afterwards, leaving the thief with nothing. The post Crypto Investor Loses $6.28M to Sophisticated Phishing Permit Scam appeared first on Cointab.
Share
Coinstats2025/09/19 01:35