From Retail Floors to Virtual Cores: ESXi Is the Next Attack Vector in Retail
Blog Published: 09/25/2025
In April 2025, a ransomware attack on Marks & Spencer paralyzed its core systems by encrypting its VMware ESXi hypervisors. The breach halted online sales, disrupted logistics, and left customers in limbo. With damages estimated at over $400 million, the attack revealed a growing trend i...
Introducing the SaaS Security Capability Framework (SSCF) v1.0: Raising the Bar for SaaS Security
Blog Published: 09/24/2025
Why SaaS Security Needs a Rethink SaaS has changed everything. From collaboration tools to critical business applications, SaaS is now the default way organizations consume technology. But with this massive shift comes a big problem: security hasn’t kept up. Most Third-Party Risk...
The Salesloft Drift OAuth Supply-Chain Attack: Cross-Industry Lessons in Third-Party Access Visibility
Blog Published: 09/25/2025
Abstract The August 2025 Salesloft Drift breach demonstrates a systemic security blind spot across all industries: third-party delegated access through OAuth integrations. Over 700 organizations — including financial institutions, technology companies, healthcare providers, and government ag...
AI Log Analysis for Event Correlation in Zero Trust
Blog Published: 09/26/2025
Modern enterprises generate oceans of logs that span on-prem, cloud, IoT, and OT. Think identity, device, data, network, and application events. Logs are the backbone of visibility, but logs alone do not provide actionable insights. They become powerful when analyzed and correlated for threa...