The Beyond Blog

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Salt Typhoon: JumbledPath Malware Targeting US Telecom Providers

25 Feb 2025

February 25, 2025

Salt Typhoon: JumbledPath Malware Targeting US Telecom Providers

Salt Typhoon is using “JumbledPath” malware to infiltrate US telecom networks. Learn how this attack is deployed and what mitigation strategies work.

Breach Analysis
Salt Typhoon: JumbledPath Malware Targeting US Telecom Providers
Darcula: Phishing-as-a-Service Platform that Autogenerates Branded Kits

24 Feb 2025

February 24, 2025

Darcula: Phishing-as-a-Service Platform that Autogenerates Branded Kits

A new breed of phishing-as-a-service (PaaS) kit has arrived and it can auto-generate brand-specific phishing pages in minutes. Here’s how Darcula works, why it’s dangerous, and what you can do to stay safe.

Breach Analysis
Darcula: Phishing-as-a-Service Platform that Autogenerates Branded Kits
Security Perimeters in Zero Trust

14 Feb 2025

February 14, 2025

Security Perimeters in Zero Trust

Securing the identity, device and application perimeter ensures that only authorized users and devices can interact with critical applications, limiting exposure to threats.

Thought Leadership
Security Perimeters in Zero Trust
How to Eliminate Identity-Based Threats

06 Feb 2025

February 6, 2025

How to Eliminate Identity-Based Threats

Legacy MFA relies on security through obscurity, weak factors, and human decision-making. Learn about the characteristics of an access solution that eliminates identity-based threats.

Thought Leadership
How to Eliminate Identity-Based Threats
From Identity Analytics to AI: My Journey into LLMs

04 Feb 2025

February 4, 2025

From Identity Analytics to AI: My Journey into LLMs

Discover how LLMs are transforming identity management from rigid queries to natural conversations. Learn how AI can enhance security analysis and simplify complex IAM tasks.

Thought Leadership
From Identity Analytics to AI: My Journey into LLMs
Active Microsoft ADFS Phishing Campaign that Bypasses MFA

04 Feb 2025

February 4, 2025

Active Microsoft ADFS Phishing Campaign that Bypasses MFA

Bad actors are exploiting access vulnerabilities to breach Microsoft Active Directory Federation Services (ADFS). Learn about the attack and how to defend against it.

Breach Analysis
Active Microsoft ADFS Phishing Campaign that Bypasses MFA
Getting Rusty: Beyond Identity’s Journey to Memory Safety

27 Jan 2025

January 27, 2025

Getting Rusty: Beyond Identity’s Journey to Memory Safety

Beyond Identity is Rust-first and have been since first-ship. This is unusual across the software industry. Learn more about our journey to strong memory safety.

Thought Leadership
Getting Rusty: Beyond Identity’s Journey to Memory Safety
Sneaky 2FA: Dangerous New Threat Targeting Microsoft 365

23 Jan 2025

January 23, 2025

Sneaky 2FA: Dangerous New Threat Targeting Microsoft 365

Sneaky 2FA is the latest phishing-as-a-service kit targeting Microsoft 365. Learn more about their exploit techniques and how to defend against them.

Breach Analysis
Sneaky 2FA: Dangerous New Threat Targeting Microsoft 365
Elevating Federal Cybersecurity: New Executive Order Prioritizes Phishing-Resistant Authentication for Federal Agencies

16 Jan 2025

January 16, 2025

Elevating Federal Cybersecurity: New Executive Order Prioritizes Phishing-Resistant Authentication for Federal Agencies

Learn more about the executive order issued in January 2025 on Strengthening and Promoting Innovation in the Nation’s Cybersecurity

Thought Leadership
Elevating Federal Cybersecurity: New Executive Order Prioritizes Phishing-Resistant Authentication for Federal Agencies