The Beyond Blog
.png)
15 Sep 2025
Universal Identity Defense for Legacy and On-Prem Applications with Beyond Identity and CrowdStrike
Extend phishing-resistant MFA to Kerberos, NTLM, LDAP, SMB with Beyond Identity + CrowdStrike.
.png)
25 Feb 2025
February 25, 2025
Salt Typhoon: JumbledPath Malware Targeting US Telecom Providers
Salt Typhoon is using “JumbledPath” malware to infiltrate US telecom networks. Learn how this attack is deployed and what mitigation strategies work.
.png)
24 Feb 2025
February 24, 2025
Darcula: Phishing-as-a-Service Platform that Autogenerates Branded Kits
A new breed of phishing-as-a-service (PaaS) kit has arrived and it can auto-generate brand-specific phishing pages in minutes. Here’s how Darcula works, why it’s dangerous, and what you can do to stay safe.
.jpeg)
14 Feb 2025
February 14, 2025
Security Perimeters in Zero Trust
Securing the identity, device and application perimeter ensures that only authorized users and devices can interact with critical applications, limiting exposure to threats.
.png)
06 Feb 2025
February 6, 2025
How to Eliminate Identity-Based Threats
Legacy MFA relies on security through obscurity, weak factors, and human decision-making. Learn about the characteristics of an access solution that eliminates identity-based threats.
.png)
04 Feb 2025
February 4, 2025
From Identity Analytics to AI: My Journey into LLMs
Discover how LLMs are transforming identity management from rigid queries to natural conversations. Learn how AI can enhance security analysis and simplify complex IAM tasks.
.png)
04 Feb 2025
February 4, 2025
Active Microsoft ADFS Phishing Campaign that Bypasses MFA
Bad actors are exploiting access vulnerabilities to breach Microsoft Active Directory Federation Services (ADFS). Learn about the attack and how to defend against it.
.png)
27 Jan 2025
January 27, 2025
Getting Rusty: Beyond Identity’s Journey to Memory Safety
Beyond Identity is Rust-first and have been since first-ship. This is unusual across the software industry. Learn more about our journey to strong memory safety.

23 Jan 2025
January 23, 2025
Sneaky 2FA: Dangerous New Threat Targeting Microsoft 365
Sneaky 2FA is the latest phishing-as-a-service kit targeting Microsoft 365. Learn more about their exploit techniques and how to defend against them.

16 Jan 2025
January 16, 2025
Elevating Federal Cybersecurity: New Executive Order Prioritizes Phishing-Resistant Authentication for Federal Agencies
Learn more about the executive order issued in January 2025 on Strengthening and Promoting Innovation in the Nation’s Cybersecurity