<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Hummingbird Security Blog</title>
    <link>https://gethumming.io/blog/</link>
    <atom:link href="https://gethumming.io/blog/feed.xml" rel="self" type="application/rss+xml"/>
    <description>Expert insights on identity threat detection and response (ITDR), AI-powered security, lateral movement prevention, OAuth token security, and post-authentication threat detection.</description>
    <language>en-us</language>
    <lastBuildDate>Wed, 04 Mar 2026 23:08:46 GMT</lastBuildDate>
    <managingEditor>hello@gethumming.io (Hummingbird Security)</managingEditor>
    <webMaster>hello@gethumming.io (Hummingbird Security)</webMaster>
    <image>
      <url>https://gethumming.io/images/icons/hummingbird-icon.svg</url>
      <title>Hummingbird Security Blog</title>
      <link>https://gethumming.io/blog/</link>
    </image>
    
    <item>
      <title>Introducing Auth Sentry Monitor: Free Identity Visibility for Every Organization</title>
      <link>https://gethumming.io/blog/auth-sentry-monitor-launch/</link>
      <guid isPermaLink="true">https://gethumming.io/blog/auth-sentry-monitor-launch/</guid>
      <pubDate>Wed, 04 Mar 2026 00:00:00 GMT</pubDate>
      <description>Today we&#39;re launching Auth Sentry Monitor — a free tier that gives every organization instant visibility into their identity security posture, with a 7-day trial of full threat detection capabilities.</description>
      <author>hello@gethumming.io (Hummingbird Security)</author>
      
      <category>Product Launch</category>
      
      <category>Identity Security</category>
      
      <category>Auth Sentry</category>
      
    </item>
    
    <item>
      <title>Threat Bulletin: Iranian APT Groups Targeting Cloud Identity Infrastructure</title>
      <link>https://gethumming.io/blog/iranian-apt-threat-bulletin/</link>
      <guid isPermaLink="true">https://gethumming.io/blog/iranian-apt-threat-bulletin/</guid>
      <pubDate>Wed, 04 Mar 2026 00:00:00 GMT</pubDate>
      <description>Iranian state-sponsored hackers are escalating attacks on cloud identity systems. Auth Sentry has deployed 11 detection rules tuned specifically for APT33, APT34, APT35/Charming Kitten, and MuddyWater tradecraft targeting Okta, Microsoft 365, and Google Workspace.</description>
      <author>hello@gethumming.io (Auth Sentry)</author>
      
      <category>Threat Bulletin</category>
      
      <category>Threat Intelligence</category>
      
      <category>Identity Security</category>
      
    </item>
    
    <item>
      <title>SLSH Vishing Attacks: Your Login Looked Fine. That&#39;s the Point.</title>
      <link>https://gethumming.io/blog/slsh-vishing-attacks-mfa-bypass/</link>
      <guid isPermaLink="true">https://gethumming.io/blog/slsh-vishing-attacks-mfa-bypass/</guid>
      <pubDate>Sat, 21 Feb 2026 00:00:00 GMT</pubDate>
      <description>How SLSH (Scattered Spider, LAPSUS$, ShinyHunters) bypasses Okta MFA with real-time voice phishing. Attack chain analysis, detection signals, and ITDR defense strategies.</description>
      <author>hello@gethumming.io (Hummingbird Security)</author>
      
      <category>Threat Analysis</category>
      
      <category>ITDR</category>
      
      <category>Vishing</category>
      
      <category>Scattered Spider</category>
      
    </item>
    
    <item>
      <title>Why Graph Intelligence Is Your Best Defense Against Identity-Based Attacks</title>
      <link>https://gethumming.io/blog/graph-intelligence-defense-identity-attacks/</link>
      <guid isPermaLink="true">https://gethumming.io/blog/graph-intelligence-defense-identity-attacks/</guid>
      <pubDate>Fri, 20 Feb 2026 00:00:00 GMT</pubDate>
      <description>Why combining graph-based detection, behavioral analytics, and traditional rules is the only sustainable defense against identity-based attacks like Scattered Spider. A technical guide for security teams.</description>
      <author>hello@gethumming.io (Hummingbird Security)</author>
      
      <category>Identity Security</category>
      
      <category>Graph Intelligence</category>
      
      <category>Scattered Spider</category>
      
      <category>ITDR</category>
      
    </item>
    
    <item>
      <title>Why Your Identity Security Tool Generates 847 Alerts and Zero Answers</title>
      <link>https://gethumming.io/blog/847-alerts-zero-answers/</link>
      <guid isPermaLink="true">https://gethumming.io/blog/847-alerts-zero-answers/</guid>
      <pubDate>Fri, 13 Feb 2026 00:00:00 GMT</pubDate>
      <description>Identity security tools generate 847+ alerts daily but miss real threats. Learn why alert-based ITDR fails and how investigation-first detection prevents credential-based breaches.</description>
      <author>hello@gethumming.io (Hummingbird Security)</author>
      
      <category>ITDR</category>
      
      <category>Identity Security</category>
      
      <category>SOC Operations</category>
      
      <category>Alert Fatigue</category>
      
    </item>
    
    <item>
      <title>The ITDR Buyer&#39;s Guide: What to Look For, What to Avoid</title>
      <link>https://gethumming.io/blog/itdr-buyers-guide/</link>
      <guid isPermaLink="true">https://gethumming.io/blog/itdr-buyers-guide/</guid>
      <pubDate>Thu, 12 Feb 2026 00:00:00 GMT</pubDate>
      <description>The complete ITDR buyer&#39;s guide for 2026. Evaluate identity threat detection solutions with vendor questions, red flags, attack scenarios, and a practical evaluation framework.</description>
      <author>hello@gethumming.io (Hummingbird Security)</author>
      
      <category>ITDR</category>
      
      <category>Identity Security</category>
      
      <category>Buyer&#39;s Guide</category>
      
    </item>
    
    <item>
      <title>MFA Fatigue Attacks: Why Your Security Team is Still Vulnerable</title>
      <link>https://gethumming.io/blog/mfa-fatigue-attacks-explained/</link>
      <guid isPermaLink="true">https://gethumming.io/blog/mfa-fatigue-attacks-explained/</guid>
      <pubDate>Thu, 13 Nov 2025 00:00:00 GMT</pubDate>
      <description>MFA fatigue attacks bypass even the strongest authentication systems. Learn how attackers exploit notification fatigue and how to defend against them.</description>
      <author>hello@gethumming.io (Hummingbird Security)</author>
      
      <category>Security</category>
      
      <category>MFA</category>
      
      <category>Attacks</category>
      
    </item>
    
  </channel>
</rss>
