Featured

Featured
6 minutes

Unpacking the Mamba 2FA Phishing Threat: Why Email Protection Isn’t Enough

Gabby Ortiz
Oct 9, 2024
Featured
4 minutes

Life of a Phish

Gabby Ortiz
Sep 19, 2024
Featured
5 minutes

How Obsidian Security Integrates with CrowdStrike FalconĀ® Next-Gen SIEM to Accelerate SaaS Threat Detection and Response

Scott Young
Sep 17, 2024
Featured
6 minutes

New OAuth Phishing Threat: Exploiting Vulnerabilities in SaaS Integration Platforms

Farah Iyer
Sep 3, 2024
Featured
4 minutes

Securing Your Snowflake Environments

Farah Iyer
Aug 13, 2024
Featured
7 minutes

How to Enact a SaaS Compliance Strategy for NIS2 and DORA

Scott Young
Jul 16, 2024
Featured
13 minutes

Shadow Linking: The Persistence Vector of SaaS Identity Threat

Rajeev Raghunarayan
Jul 1, 2024
Featured
7 minutes

Dissecting Real World Help Desk Social Engineering Attacks

Rajeev Raghunarayan
Jun 25, 2024
Featured
3 minutes

The Growing Importance of Securing Local Access in SaaS Applications

Farah Iyer
Jun 14, 2024