Resources

Keep up with InsiderSecurity news and updates here.

Recent Posts

AllInsider LabInsightsNewsProduct Information

Cisco WebEx sabotage: How a disgruntled ex-employee caused $2.4 million in damages

Discover how a disgruntled ex-employee sabotaged Cisco WebEx, causing $2.4 million in...

Read More >>

Exposure of airport employee records – A story of accident misconfiguration

Discover how a misconfigured AWS S3 bucket led to the exposure of...

Read More >>

What you need to know about MFA-bypass email phishing threats

Discover the rising threat of MFA bypassing phishing attacks and learn how...

Read More >>

Uber Hack – A Deeper Dive

Explore the intricacies of the Uber hack by LAPSUS$ in this detailed...

Read More >>

APT29 in the cloud: A deeper dive

Dive into our detailed exploration of APT29's cloud-based attacks. Discover how this...

Read More >>

LastPass hack: A deeper dive

Dive into the comprehensive analysis of the LastPass Hack, exploring the implications...

Read More >>

A comprehensive guide to Singapore cybersecurity compliance

Discover the essentials of Singapore cybersecurity compliance, covering government, financial, healthcare, and...

Read More >>

CircleCI’s breach analysis and lessons

Dive into our comprehensive analysis of CircleCI's cybersecurity breach and learn how...

Read More >>

Hybrid cloud security – Top challenges and best practices

Uncover hybrid cloud security challenges and best practices, addressing visibility, misconfigurations, network...

Read More >>

InsiderSecurity is now CSA STAR Level 2 certified

InsiderSecurity is the FIRST cybersecurity software company from Singapore and likely Southeast...

Read More >>

InsiderSecurity is now ISO 27001 certified

InsiderSecurity achieves ISO 27001 certification with zero non-conformities and is honored with...

Read More >>

Detecting compromised accounts in Microsoft 365 with InsiderSecurity’s free CASUAL tool

InsiderLab conducts in-depth research of emergent cyber threats. We introduce a free...

Read More >>

Uber Hack – A Deeper Dive

Explore the intricacies of the Uber hack by LAPSUS$ in this detailed analysis. Understand the methods used by threat actors and learn effective detection strategies to safeguard your cloud infrastructure.

Read More »

APT29 in the cloud: A deeper dive

Dive into our detailed exploration of APT29’s cloud-based attacks. Discover how this sophisticated cyber threat operates and learn practical detection strategies to protect your organization’s cloud infrastructure.

Read More »