A couple of months ago my boss asked me to look up something called evilginx, then he joined a meeting with a client. 20 minutes later he finished his meeting and turned to see me leaning back on my chair with my hands behind my head not doing anything.
In a very "why aren't you working?" tone of voice he asked me if I had looked up that program he mentioned. I pressed the enter key on my keyboard to send him a teams message with a URL to a fully functional o365 phishing server* that laughs at the MFA he has been preaching to clients as the saviour of IT security for the last few years**.
If you work in IT and have any responsibility over user accounts, you need to set aside 20 minutes to deploy it on a VM*** - and several days for subsequent internal discussion... If your entire IT team doesn't shit themselves after seeing it for themselves it is because they don't understand what they are seeing!
Since then I have been investigating every phishing email that gets reported to our helpdesk as part of an effort to come up with some kind of technical defence, and evilginx isn't as advanced as some of the servers I have seen in the wild...!
This stuff is well known to "the bad guys". If it is part of your job to defend against such things then you need to know what you are up against... And if you read the comment section of the register then it is probably an interesting thing to set up as well!
* There are pre-written config files for every major service you might want to phish.
** I of course have pointed out that MFA can be intercepted every time I heard him doing this, but he always dismissed that as some pedantic hypothetical thing that nobody really needs to worry about...
*** This was "from scratch", including deploying a new VM and configuring DNS records!