Detecting & Blocking Tycoon’s latest AiTM Phishing Kit

Detecting & Blocking Tycoon’s latest AiTM Phishing Kit

This blog details how Obsidian detects and blocks the latest version of Tycoon, an adversary-in-the-middle (AiTM), Phishing-as-a-Service (PhaaS) platform that leverages a reverse proxy to intercept and replay credentials and MFA prompts ...
Risky Business: How HR Tech is Contributing to SaaS Risks

Risky Business: How HR Tech is Contributing to SaaS Risks

In today’s digital-first world, individuals are bringing B2C behaviors into the B2B sphere. Just as someone might casually share personal login details with platforms like Turbotax for tax filing, many are now ...
Streamline your SBOM management with SBOM Manager

Streamline your SBOM management with SBOM Manager

Modern software development means applications are woven from diverse components sourced from in-house development, open source repositories, and external vendors. Keeping track of all these dependencies is becoming more critical as governments ...
Secure Software Development Attestation Form: Sonatype helps you comply

Secure Software Development Attestation Form: Sonatype helps you comply

On March 11, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) and the Office of Management and Budget (OMB) unveiled the final version of the Secure Software Development Attestation Form. This pivotal ...
How Does Zcash Work?

How Does Zcash Work?

| | FEATURED, ZK
How does Zcash work? Understanding Zerocash and Zcash ...
OT/ICS Security in the Power Sector

Complete Guide to OT/ICS Security in the Power Sector

Electricity, a resource often taken for granted, is the lifeblood of our modern world, powering our daily lives, industries, and economies. But the systems that generate, transmit, and distribute this essential resource ...
SaaS Under Siege: Nation-State Actors Target Identities

SaaS Under Siege: Nation-State Actors Target Identities

TL;DR – Like bank robbers and banks, nation-state actors are now targeting SaaS because that’s where the currency is. Plus, now it’s even easier than traditional endpoint compromise. In case you missed ...
A Guide to Cybersecurity Compliance in The Manufacturing Sector

A Guide to Cybersecurity Compliance in the Manufacturing Sector

The manufacturing sector is one of the most extensive, exceptionally varied, and swiftly evolving segments of the global economy. As we walk through the third decade of the twenty-first century, we notice ...
Complete Guide to Advanced Persistent Threat (APT) Security

Complete Guide to Advanced Persistent Threat (APT) Security

This is what an advanced persistent threat (APT) attack is like. APTs are sophisticated, targeted cyberattacks designed to evade detection and steal sensitive data over a prolonged period. APTs are carried out ...
Complete Guide to OT Security Compliance

Complete Guide to OT Security Compliance

| | Compliance, FEATURED, OT
OT security priorities are essential for a successful OT security program. How prepared are you? Before you can properly secure your OT environment, you must understand the challenges you face. In the ...