Skip to main content
New Paradigm Security
Governance, Risk & Compliance
Strategic Foundation
vCISO (Fractional CISO)
Enterprise GRC & Regulatory Compliance
Third Party Risk Management
Business Continuity Management
Vendor Security Guidance
Microsoft Security & Cloud
Technical Integration
Microsoft Purview Solutions
Microsoft Sentinel Services
Microsoft Entra ID Solutions
Microsoft Defender for Endpoint Solutions
Explore all our solutionsOverview
Success StoriesResourcesBlog
Get in Touch
New Paradigm Security

New Paradigm Security is an independent advisory firm specialised in Cybersecurity and Compliance. We help ambitious organisations build a secure, resilient digital future.

Enterprise Security. Strategic Advisory.

Services

  • vCISO (Fractional CISO)
  • Enterprise GRC & Regulatory Compliance
  • Third Party Risk Management
  • Business Continuity Management
  • Vendor Security Guidance
  • Microsoft Purview Solutions
  • Microsoft Sentinel Services
  • Microsoft Entra ID Solutions
  • Microsoft Defender for Endpoint Solutions

Company

  • About Us
  • Blog
  • Resources
  • Success Stories
  • Contact

Contact

contact@newparadigmsecurity.nl+31 6 5593 1795
Jane Addamslaan 169, 1187DA Amstelveen

© 2026 New Paradigm Security BV. Amstelveen, The Netherlands.

Privacy Policy
Live Threat Simulation · Microsoft Entra ID & Zero Trust

Your MFA Won't Stop This Attack

Adversary-in-the-Middle phishing captures authenticated sessions in real-time — bypassing push notifications, SMS codes, and phone-call MFA. Step through the attack chain below.

Step 1 of 8
T-24hRECONSTANDING BY
CLONE
Attacker Action

Tycoon2FA kit deploys a pixel-perfect M365 clone

Available from €150/month as phishing-as-a-service. Evilginx3 reverse-proxy mirrors your exact tenant branding — logo, colours, login hint. The typosquat domain is registered hours before launch.

Defense Response

Five identity-layer controls standing by

No perimeter tool can catch external phishing infrastructure — but Conditional Access, FIDO2, Token Protection, Identity Protection, and Adaptive Protection are waiting.

Based on Tycoon2FA / Evilginx3 attack techniques documented by Microsoft Threat Intelligence · © New Paradigm Security BV · CISSP · CISM · CIPP/E