Blog

Updates and insights on cybersecurity, machine learning and the cloud.

Security Guidance
5 minutes

Emerging Identity Threats: The Muddy Waters of Residential Proxies

Noah Corradin
May 6, 2024
Featured
5 minutes

Behind the Breach: Pass-The-Cookie Beyond IdPs

Ryan Wisniewski and Shuyang Wang
Jan 19, 2024
Featured
3 minutes

The rise of BYOD: how to secure personal devices

Ryan Wisniewski, Shuyang Wang and Farah Iyer
Dec 17, 2024
Featured
7 minutes

“Butcher Shop” phishing campaign targets legal, government and construction firms

Obsidian Threat Research Team
Dec 12, 2024
Featured
4 minutes

MFA Arbitrage: What You Need to Know

Jessica Castellanos and Alexander Vandenberg-Rodes
Nov 12, 2024
Featured
9 minutes

Australian Regulation CPS 230’s Impending Impact on SaaS

Scott Young
Nov 7, 2024
Featured
6 minutes

Unpacking the Mamba 2FA Phishing Threat: Why Email Protection Isn’t Enough

Chris Fuller
Oct 9, 2024
Featured
4 minutes

Life of a Phish

Shuyang Wang & Farah Iyer
Sep 19, 2024
Featured
5 minutes

How Obsidian Security Integrates with CrowdStrike Falcon® Next-Gen SIEM to Accelerate SaaS Threat Detection and Response

Andrew Latham
Sep 17, 2024
Security Guidance
6 minutes

New OAuth Phishing Threat: Exploiting Vulnerabilities in SaaS Integration Platforms

Gavin Zhong and Shuyang Wang
Sep 3, 2024
Featured
4 minutes

Securing Your Snowflake Environments

Rajeev Raghunarayan and Chris Fuller
Aug 13, 2024