Domain squatting, typosquatting and homograph detection with Swimlane

Domain squatting, typosquatting and homograph detection with Swimlane

| | Use Cases
Introduction Domain Squatting, typosquatting and IDN homograph attacks are a combination of techniques used by malicious actors to harvest credentials from an organization, distribute malware, harm an organization’s reputation, or otherwise maliciously ...

Swimlane research team open sources py-ews

Phishing impacts every organization, and security operations (SecOps) teams need to act quickly to remediate and prevent unknown threats within their email infrastructure. To help combat these threats, the Swimlane research team ...
Automating your employee off-boarding process with Swimlane

Automating your employee off-boarding process with Swimlane

| | Use Cases
As more organizations discontinue internal services and begin adopting an increasing number of third-party *aaS-based services, ensuring the appropriate access is revoked in a timely manner is critical. By using our new ...
Automate employee off-boarding processes with Swimlane

Automate employee off-boarding processes with Swimlane

| | Use Cases
As more organizations discontinue internal services and begin adopting an increasing number of third-party *aaS-based services, ensuring the appropriate access is revoked in a timely manner is critical. By using our new ...
Understanding Microsoft's OAuth2 implementation - Part 3: Using Microsoft Graph API

Understanding Microsoft's OAuth2 implementation – Part 3: Using Microsoft Graph API

| | integrations, Use Cases
In this third and final part of the "Understanding Microsoft’s OAuth2 Implementation" series, we will be using the application that we have previously created to authenticate to the Microsoft Graph API. If ...
Microsoft's OAuth2 Implimentation: Using Microsoft Graph API

Microsoft's OAuth2 Implimentation: Using Microsoft Graph API

| | integrations, Use Cases
In this third and final part of the "Understanding Microsoft’s OAuth2 Implementation" series, we will be using the application that we have previously created to authenticate to the Microsoft Graph API. If ...
Microsoft's OAuth2 Implementation: Using Microsoft Graph API

Microsoft's OAuth2 Implementation: Using Microsoft Graph API

| | integrations, Use Cases
In this third and final part of the "Understanding Microsoft’s OAuth2 Implementation" series, we will be using the application that we have previously created to authenticate to the Microsoft Graph API. If ...
Microsoft's OAuth2 implementation: Using Microsoft Graph API

Microsoft's OAuth2 implementation: Using Microsoft Graph API

| | integrations, Use Cases
In this third and final part of the "Understanding Microsoft’s OAuth2 Implementation" series, we will be using the application that we have previously created to authenticate to the Microsoft Graph API. If ...
Microsoft's OAuth2 implementation: Registering an app

Microsoft's OAuth2 implementation: Registering an app

| | integrations, Use Cases
In my last post, I explained the different API endpoints available for authentication using Microsoft’s OAuth2. Additionally, I shared the different types of applications and their authentication flows. In Part 2, I ...
Microsoft's OAuth2 Implimentation: Registering an App

Microsoft's OAuth2 Implimentation: Registering an App

| | integrations, Use Cases
In my last post, I explained the different API endpoints available for authentication using Microsoft’s OAuth2. Additionally, I shared the different types of applications and their authentication flows. In Part 2, I ...
Loading...