FEATURED
OT/ICS Vulnerability Assessment and Penetration Testing (VAPT) – A Complete Guide
Have you ever wondered about the hidden chinks in the armor of your operational technology systems? In the interconnected web of technology, where the digital landscape extends its reach into every corner ...
Top 10 open source projects hit by HTTP/2 ‘Rapid Reset’ zero-day
Executive summary In this blog post we list at least 10 open source packages affected by the HTTP/2 'Rapid Reset' vulnerability, disclosed by Cloudflare this week ...
Introducing the SaaS Event Maturity Matrix (EMM)
Learn about the Threat Detection framework for assessing SaaS audit logging from different SaaS platforms commonly used by enterprises. The post Introducing the SaaS Event Maturity Matrix (EMM) appeared first on AppOmni ...
SaaS Security in Healthcare: What You Need to Know
The migration to SaaS has resulted in the distribution of valuable data across a number of highly decentralized cloud applications. While the security impact of this shift can be felt across all ...
Breaking Down APRA CPS 230 Critical SaaS Operations Compliance
Learn how APRA CPS 230 mandates affect your cloud and SaaS stack, along with actionable steps to take to achieve compliance starting in July 2025. The post Breaking Down APRA CPS 230 ...
Introducing our 9th annual State of the Software Supply Chain report
In our fast-paced digital world, striving for excellence is an ongoing journey marked by the relentless pursuit of innovation, efficiency, and a focus on the essential contributors: the developers. Our 9th annual ...
NIST 800-82 R2/R3: A Practical Guide for OT Security Professionals
“Is our critical infrastructure truly secure in the face of ever-evolving cyber risks and insider threats?” This question resonates with an urgency that cannot be disregarded in a world where technology is ...
Behind The Breach: Social Engineering of Helpdesk Agents
The Obsidian Threat Research team has determined an uptick in SaaS compromises where the initial access vector is social engineering of a helpdesk agent. Fortunately, threat actors tend to follow a predictable ...
OT Attack Path Analysis: A Comprehensive Guide
The convergence of Information technology (IT) and Operational technology (OT) networks, resulting in the exposure of OT networks to threats, paved the way for OT cybersecurity. OT is the use of hardware ...
Fundamentals of attack path analysis in an OT environment
At its core, an attack path analysis presents a powerful visual and impactful representation covering a potential path that cyber threat actors or malicious payloads may tread to breach asset or network ...