Threat Briefings

Stay ahead of the latest cybersecurity threats with decrypted attack and threat insights designed to keep your organization secure and resilient.

Lucie Cardiet
and
Attackers Don’t Hack In — They Log In: The MFA Blind Spot

Attackers bypass MFA using non-interactive sign-ins. Learn how to detect and stop credential-based threats before they escalate.

Read more
Lucie Cardiet
and
The rise of supply chain-driven data theft in SaaS environments

Supply chain attacks are shifting from exploits to access reuse. Learn how stolen tokens, SaaS integrations, and fragmented visibility enable data theft without triggering traditional detection.

Read more
Lucie Cardiet
and
Breaking down the axios supply chain incident

A compromised npm package is only the entry point. The axios incident shows how quickly attackers pivot from code execution to credential abuse, identity misuse, and cloud access.

Read more

Videos

Threat Briefings
Threat Briefing: The NPM Exploit that Turned into a Self-Spreading Worm

Discover how the initial NPM exploit evolved into a self-spreading worm, Shai Hulud, and learn key lessons to protect your software supply chain.

Briefings

Insights straight to your inbox

Sign up for bi-weekly threat briefings and security research findings