Why SlashID
Identity ProtectionBlogDocumentation
Why SlashID
Use Cases
Discover Identity RiskEliminate IAM DebtIdentity Threat Detection & ResponseIdentity Security Posture ManagementAutomate Compliance Gap AnalysisSecure Non-Human Identities & AI AgentsStop Phishing & Vishing AttemptsDiscover & Block Shadow AppsIdentity ProtectionBlogDocumentation

Blog

Security

/ 16 Jan, 2026

Scattered Spider Tradecraft: Identity Abuse, Attack Flow, and Defense

Scattered Spider is a highly adaptive cybercrime group that breaches enterprises by abusing identity, trust, and legitimate access paths rather than malware exploits.

Learn about their identity-centric attack flow, real-world campaigns like the MGM and Caesars breaches, and how to defend against these sophisticated threats.

Scattered Spider Tradecraft: Identity Abuse, Attack Flow, and Defense

Security

/ 16 Jan, 2026

Scattered Spider Tradecraft: Identity Abuse, Attack Flow, and Defense

Scattered Spider is a highly adaptive cybercrime group that breaches enterprises by abusing identity, trust, and legitimate access paths rather than malware exploits.

Learn about their identity-centric attack flow, real-world campaigns like the MGM and Caesars breaches, and how to defend against these sophisticated threats.

SlashID Team
SlashID Team

Tutorial

/ 5 Sep, 2023

Protecting Exposed APIs: Avoid Data Leaks with SlashID Gate and OPA

Adequately protecting APIs is key to avoid data leaks and breaches.

Just recently, an exposed API allowed an attacker to scrape over 2.6 million records from Duolingo.

In this article, we’ll show how you can use Gate to detect, respond to, and prevent these kinds of incidents.

Vincenzo Iozzo
Vincenzo Iozzo

Open Source

/ 28 Aug, 2023

Docusaurus - Authentication and authorization with SlashID

The latest docusaurus-slashid-login theme adds finer grained access control to your Docusaurus website.

Ivan Kovic
Ivan Kovic

New Feature

/ 25 Jul, 2023

Authenticate your Shopify customers with SlashID

The new SlashID Login app for Shopify lets your customers authenticate seamlessly using quick and safe methods like passkeys, social login and magic links.

Ivan Kovic, Kasper Mroz, Matilde Stefanini, Vincenzo Iozzo
Ivan Kovic, Kasper Mroz, Matilde Stefanini, Vincenzo Iozzo
Ivan Kovic, Kasper Mroz, Matilde Stefanini, Vincenzo Iozzo
Ivan Kovic, Kasper Mroz, Matilde Stefanini, Vincenzo Iozzo
Ivan Kovic, Kasper Mroz, Matilde Stefanini, Vincenzo Iozzo

New Feature

/ 20 Jul, 2023

Synchronous Webhooks

We are excited to release synchronous webhooks, the latest addition to our webhooks features.

With synchronous webhooks, you can extend SlashID Access to suit your business needs in a few simple steps, in whatever language and environment makes sense for you.

Joseph Gardner
Joseph Gardner

Tutorial

/ 16 Jul, 2023

Building a React Login Page Template

Discover how to create a secure login page for your React app with authentication and styling using SlashID.

Ivan Kovic
Ivan Kovic

New Feature

/ 10 Jun, 2023

SlashID Analytics Webhooks

We are excited to release SlashID analytics and webhooks, providing greater visibility and actionable insights into your authentication flows.

Joseph Gardner, Ivan Kovic
Joseph Gardner, Ivan Kovic
Joseph Gardner, Ivan Kovic

Deep Dives

/ 24 May, 2023

Passkeys - Threat modeling and implementation considerations

In this blog post, we review the current state of the technology from a security standpoint and we’ll discuss some critical aspects of passkey implementation.

Vincenzo Iozzo, Kasper Mroz
Vincenzo Iozzo, Kasper Mroz
Vincenzo Iozzo, Kasper Mroz

New Feature

/ 12 May, 2023

Authentication flows with SlashID

Implement MFA and Step-Up Authentication in React applications with SlashID.

Kasper Mroz, Ivan Kovic
Kasper Mroz, Ivan Kovic
Kasper Mroz, Ivan Kovic

Tutorial

/ 20 Feb, 2023

Using Google Tink to sign JWTs with ECDSA

In this blog post, we will show how the Tink cryptography library can be used to create, sign, and verify JSON Web Tokens (JWTs), as well as to manage the cryptographic keys for doing so.

Joseph Gardner
Joseph Gardner
1 2 3 4 5 6 7

Ready to start a top-tier security upgrade?

Get in touch
Terms · Privacy · System Status
© 2025 SlashID® Inc. All Rights Reserved.

Products

Why SlashID
Identity Protection Use Cases
Identity Management

Resources

Blog Documentation

We use cookies to improve your experience. Read our cookie policy.