Featured

Featured
4 minutes

Behind the Breach: Malicious Attack on Cyberhaven’s Chrome Extension Developer Team

Gabby Ortiz
Jan 15, 2025
Featured
5 minutes

How to Secure Microsoft 365 for CISA: SCuBA Made Simple

Scott Young
Jan 7, 2025
Featured
3 minutes

The rise of BYOD: how to secure personal devices

Farah Iyer
Dec 17, 2024
Featured
7 minutes

“Butcher Shop” phishing campaign targets legal, government and construction firms

Farah Iyer
Dec 12, 2024
Featured
4 minutes

MFA Arbitrage: What You Need to Know

Farah Iyer
Nov 12, 2024
Featured
9 minutes

Australian Regulation CPS 230’s Impending Impact on SaaS

Scott Young
Nov 7, 2024
Featured
6 minutes

Unpacking the Mamba 2FA Phishing Threat: Why Email Protection Isn’t Enough

Gabby Ortiz
Oct 9, 2024
Featured
4 minutes

Life of a Phish

Gabby Ortiz
Sep 19, 2024
Featured
5 minutes

How Obsidian Security Integrates with CrowdStrike Falcon® Next-Gen SIEM to Accelerate SaaS Threat Detection and Response

Scott Young
Sep 17, 2024