Most cloud detection programs are built to triage. Affirm built theirs to engineer. See how it works.
Join the webinar
A compromised third-party app gave attackers OAuth access to Vercel. Here's what Expel found hunting across customer environments—and what to do now.
Anthropic Mythos didn't create new vulnerabilities. It just made them cheaper to find. Here's what defenders need to know.
Device code authentication phishing bypasses MFA by exploiting a legitimate Microsoft feature. Here's how the attack works and how to stop it.
InstallFix is a new watering hole attack we're seeing, and it leverages Claude Code as the lure. Here's what you need to know.