Research Unit

A pink upward-trending graph labeled Research Insights shows GitHub, Google Workspace, Drift, and Salesloft logos along the path, with warning icons highlighting a Salesloft Drift Breach and Google on a dark digital background.

The Salesloft Drift Breach and the Impact on Google Workspace  

A digital illustration features the Google logo on a shield at the center, surrounded by binary code, technology icons, and the text Research Insights on a translucent banner, highlighting 2025 identity threats. The background is dark purple.

The New Front Line: Identity Threats Targeting Google Workspace in 2025 

A digital graphic titled Research Insights shows a central icon with three colored pathways leading to boxes labeled Exfiltration, Lateral Movement, and Recon—each with a symbol—highlighting key attack surface areas in Microsoft 365.

Unpacking the Microsoft 365 Copilot Attack Surface

A glowing digital key emits light toward a padlock’s keyhole, with shield icons and binary patterns in the background. A label reads Research Insights in the top left corner. The image has a dark, technological theme.

From Vishing to OAuth Abuse: How ShinyHunters Compromised the Cloud

A cracked folder with the SharePoint logo appears over a broken digital chain and red security shield icons, suggesting a data breach. “Research Insights” is written at the top left. The background features binary code.

Adversary Tactics and Exploitation Paths in SharePoint Online 

A pink cube labeled CrushFTP is centered on a digital background with warning symbols, hinting at a Zero-Day exploited vulnerability. The text Research Insights appears in the upper left, reinforcing the tech and cybersecurity theme.

Critical Zero-Day in CrushFTP Actively Exploited

A hooded figure with glowing eyes stands against a dark, digital background with shield icons. A file labeled EXE and the AVG logo is in the foreground. The words Research Insights appear at the top left.

Bring Your Own (AV) Installer (BYOAI) Evasion: Abusing AV to Slip Past EDR

A timeline graphic titled Research Insights shows four stages: Access LSASS, Read Memory, Allocate & Inject, and Attempt Execution, each with an icon and color-coded highlight on a dark digital background.

Credential Dumping in Action: Simulating Fileless Threats to Test Your Defenses 

A human hand and a robotic hand reach toward each other, with the human hand holding a glowing AI text. The words Research Insights appear in a box at the top left, set against a dark, futuristic background.

Unlocking the AI Hybrid Era for MSP-Driven Cybersecurity in SMBs with Guardz

A digital illustration of Earth with pink data graphs and shield icons, symbolizing cybersecurity and hacktivism. The text Research Insights appears on a dark banner at the top left. The color scheme is primarily black, pink, and white.

Israel-Iran Cyber Warfare: Threats, Hacktivism, Disinformation, and Implications on US Companies

Holistic Protection.
Hassle-Free.
Cost-Effective.