Threat Briefings

Stay ahead of the latest cybersecurity threats with decrypted attack and threat insights designed to keep your organization secure and resilient.

Lucie Cardiet
and
Attackers Don’t Hack In — They Log In: The MFA Blind Spot

Attackers bypass MFA using non-interactive sign-ins. Learn how to detect and stop credential-based threats before they escalate.

Read more
Lucie Cardiet
and
Supply chain-driven data theft in SaaS: ShinyHunters, Anodot, and the pattern that's repeating.

Another supply-chain breach hit SaaS in April 2026 — Anodot tokens used to access Snowflake. Why the same ShinyHunters-branded pattern keeps repeating, and what makes the MO hard to detect.

Read more
Lucie Cardiet
and
Breaking down the axios supply chain incident

A compromised npm package is only the entry point. The axios incident shows how quickly attackers pivot from code execution to credential abuse, identity misuse, and cloud access.

Read more

Videos

Threat Briefings
Threat Briefing: The NPM Exploit that Turned into a Self-Spreading Worm

Discover how the initial NPM exploit evolved into a self-spreading worm, Shai Hulud, and learn key lessons to protect your software supply chain.

Briefings

Insights straight to your inbox

Sign up for bi-weekly threat briefings and security research findings