Featured Posts
Adaptive Defense: How Cloud App Policies Can Block Malicious User Agents
Overview: Microsoft 365 Apps Many organizations seek to block malicious user agents and prevent scripted or unauthorized programmatic access to Microsoft 365. Adversary-in-the-Middle (AiTM) attacks are on the rise, allowing attackers to intercept and forward authentication traffic in real time, even circumventing multi-factor authentication (MFA). A significant development is the adoption of malicious user agents, […]
Read More

Security Abuse of Misconfigured Active Directory Certificate Services Continue
All Posts

Adaptive Defense: How Cloud App Policies Can Block Malicious User Agents

Security Abuse of Misconfigured Active Directory Certificate Services Continue

Cyber Threats Targeting the Australian Mining Industry – Key Findings

Resurgence in Lumma Stealer Malware Campaigns – Notes from the Field

SecurityHQ’s Enhanced Threat & Risk Intelligence with Group-IB