Featured | Threat Research | May 11, 2022 Spoofing SaaS Vanity URLs for Social Engineering Attacks By Tal Peleg
Threat Research | March 29, 2022 Defending Your Cloud Environment Against LAPSUS$-style Threats By Nathan Coppinger
Threat Research | March 11, 2022 Is this SID taken? Varonis Threat Labs Discovers Synthetic SID Injection Attack By Eric Saraga
Threat Research | February 2, 2022 Using Power Automate for Covert Data Exfiltration in Microsoft 365 By Eric Saraga