In my previous article, I talked about the cyclical nature of an account takeover (ATO) attack. Although ATO is often viewed as a singular attack, it is actually the culmination of a series of steps involving the theft, validation and fraudulent use of users’ credentials. Now, I want to expand…