Threat Research | March 11, 2022 Is this SID taken? Varonis Threat Labs Discovers Synthetic SID Injection Attack By Eric Saraga
Threat Research | February 2, 2022 Using Power Automate for Covert Data Exfiltration in Microsoft 365 By Eric Saraga
Threat Research | November 17, 2021 No Time to REST: Check Your Jira Permissions for Leaks By Omri Marom
Threat Research | November 2, 2021 Einstein's Wormhole: Capturing Outlook & Google Calendars via Salesforce Guest User Bug By Nitay Bachrach
Threat Research | November 2, 2021 BlackMatter Ransomware: In-Depth Analysis & Recommendations By Dvir Sason