FEATURED
Detecting & Blocking Tycoon’s latest AiTM Phishing Kit
This blog details how Obsidian detects and blocks the latest version of Tycoon, an adversary-in-the-middle (AiTM), Phishing-as-a-Service (PhaaS) platform that leverages a reverse proxy to intercept and replay credentials and MFA prompts ...
Risky Business: How HR Tech is Contributing to SaaS Risks
In today’s digital-first world, individuals are bringing B2C behaviors into the B2B sphere. Just as someone might casually share personal login details with platforms like Turbotax for tax filing, many are now ...
Streamline your SBOM management with SBOM Manager
Modern software development means applications are woven from diverse components sourced from in-house development, open source repositories, and external vendors. Keeping track of all these dependencies is becoming more critical as governments ...
Secure Software Development Attestation Form: Sonatype helps you comply
On March 11, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) and the Office of Management and Budget (OMB) unveiled the final version of the Secure Software Development Attestation Form. This pivotal ...
Complete Guide to OT/ICS Security in the Power Sector
Electricity, a resource often taken for granted, is the lifeblood of our modern world, powering our daily lives, industries, and economies. But the systems that generate, transmit, and distribute this essential resource ...
SaaS Under Siege: Nation-State Actors Target Identities
TL;DR – Like bank robbers and banks, nation-state actors are now targeting SaaS because that’s where the currency is. Plus, now it’s even easier than traditional endpoint compromise. In case you missed ...
A Guide to Cybersecurity Compliance in the Manufacturing Sector
The manufacturing sector is one of the most extensive, exceptionally varied, and swiftly evolving segments of the global economy. As we walk through the third decade of the twenty-first century, we notice ...
Complete Guide to Advanced Persistent Threat (APT) Security
This is what an advanced persistent threat (APT) attack is like. APTs are sophisticated, targeted cyberattacks designed to evade detection and steal sensitive data over a prolonged period. APTs are carried out ...
Complete Guide to OT Security Compliance
OT security priorities are essential for a successful OT security program. How prepared are you? Before you can properly secure your OT environment, you must understand the challenges you face. In the ...