Threat Research | January 23, 2023 CrossTalk and Secret Agent: Two Attack Vectors on Okta's Identity Suite By Tal Peleg and Nitay Bachrach
Threat Research | November 15, 2022 Varonis Threat Labs Discovers SQLi and Access Flaws in Zendesk By Tal Peleg
Threat Research | October 25, 2022 The Logging Dead: Two Event Log Vulnerabilities Haunting Windows By Dolev Taler
Threat Research | September 15, 2022 Fighting Golden Ticket Attacks with Privileged Attribute Certificate (PAC) By Masha Garmiza
Featured | Threat Research | May 11, 2022 Spoofing SaaS Vanity URLs for Social Engineering Attacks By Tal Peleg
Threat Research | March 29, 2022 Defending Your Cloud Environment Against LAPSUS$-style Threats By Nathan Coppinger