A digital diagram showing a central IP address connecting to various icons labeled Key Vault, Storage Account, Graph, and API—demonstrating Azure Managed Identity usage—with warning symbols near the API. Research Insights is highlighted at the top left.

Exploiting Azure Managed Identity Tokens from IMDS

Logos of Guardz and C-Data are shown side by side with a plus sign between them, on a dark background with green circuit-like lines, highlighting a partnership in cybersecurity solutions for MSPs.

Guardz and C-Data Partner to Bring Scalable Cybersecurity to MSPs Serving the SMB Market

A glowing red padlock icon appears at the center of a digital world map, surrounded by data charts and graphs, representing cybersecurity and data protection amid a global campaign. The text Research Insights is displayed in the top left corner.

The 90-Day Siege: Inside a Global Campaign

A glowing digital countdown timer shows 00:07—Seven Seconds—on a futuristic platform, with a red warning symbol inside a shield behind it. Stop Akira appears in a translucent banner amid a dark tech-themed background.

Seven Seconds to Stop Akira

Digital illustration of a user icon split between blue and red halves, surrounded by abstract tech elements, email icons, and warning symbols, symbolizing cybersecurity threats or data breaches.

25 Social Engineering Statistics That MSPs Should Know About in 2026

Flowchart showing a service principal with over-privileged permission User.DeleteRestore.All, leading to directory users and potential account deletion, with a warning icon highlighting the permission risk.

How Attackers Leverage Over-Permissions

A flowchart with three steps—Trusted OAuth (Microsoft and Google logos), Silent Redirect (login.microsoftonline...), Attack Page (/malicio...)—illustrates a phishing attack vector using OAuth, highlighting prompt=none and invalid scope.

How Attackers Turn OAuth into a Phishing Vector

A digital dashboard displays Baseline Security Mode ENABLED with a blue toggle switch. Below, it shows Authentication 5/5, Files 6/6, Room Devices 2/2. The top left corner reads Research Insights.

Baseline Security Mode for SMBs – Why it Matters  

A digital graphic shows two Malicious AuthTool.exe binaries running at 11:15 AM from different locations, with warning icons and a Research Insights label on a red, technology-themed background—ideal for a threat hunt scenario.

Two Binaries, One Name: How a Threat Hunt Uncovered a Malicious AuthTool.exe Hiding

A glowing digital interface displays a list of files, featuring a highlighted PDF icon and warning symbol—perfect for illustrating API Email Security. The dark background with blue and purple light effects adds a futuristic look.

API Email Security vs Secure Email Gateway

Holistic Protection.
Hassle-Free.
Cost-Effective.
Slack
Slack
Chat with us No Slack account needed.