Security Guidance

Security Guidance
4 minutes

Behind the Breach: Malicious Attack on Cyberhaven’s Chrome Extension Developer Team

Gabby Ortiz
Jan 15, 2025
Security Guidance
6 minutes

Unpacking the Mamba 2FA Phishing Threat: Why Email Protection Isn’t Enough

Gabby Ortiz
Oct 9, 2024
Security Guidance
4 minutes

Life of a Phish

Gabby Ortiz
Sep 19, 2024
Security Guidance
6 minutes

New OAuth Phishing Threat: Exploiting Vulnerabilities in SaaS Integration Platforms

Farah Iyer
Sep 3, 2024
Security Guidance
4 minutes

Securing Your Snowflake Environments

Farah Iyer
Aug 13, 2024
Security Guidance
13 minutes

Shadow Linking: The Persistence Vector of SaaS Identity Threat

Rajeev Raghunarayan
Jul 1, 2024
Security Guidance
3 minutes

The Growing Importance of Securing Local Access in SaaS Applications

Farah Iyer
Jun 14, 2024
Security Guidance
4 minutes

A Practical Guide for Handling Unauthorized Access to Snowflake

Farah Iyer
Jun 3, 2024
Security Guidance
4 minutes

Prevent IdP Bypass and Stop Unauthorized Salesforce Access

Farah Iyer
May 8, 2024