Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Configuration Drift Behind the Teams Helpdesk Breach

On April 22, 2026, Google's Threat Intelligence Group and Mandiant disclosed a campaign by a threat actor they're tracking as UNC6692. The group breached enterprise networks by impersonating IT helpdesk staff over Microsoft Teams, ultimately exfiltrating Active Directory databases and achieving full domain compromise. What's notable about UNC6692 is what they didn't do. They didn't use a zero-day. They didn't exploit a software vulnerability.

Measuring Real Risk Reduction Across Your Security Stack

Garrett Hamilton recently presented at the North Texas ISSA Lunch & Learn in Plano, TX to talk about what risk reduction actually looks like in practice. Reach shows customers exactly which controls they've deployed, the user impact of those changes, and how much risk has been reduced across IAM, EDR, email, firewall, and SASE. Not feature checklists. Targeted, measurable outcomes tied to the business.

New Research Finds Configuration Drift is Driving Cybersecurity Incidents Across 97% of Organizations

The study, commissioned by Reach Security, reveals widespread misconfigurations, slow remediation cycles, and manual approaches to drift management, highlighting the urgent need for preemptive approaches that continuously validate security controls.

Scaling Reach Security the Right Way

New year, new faces, big goals. To close out 2025 and open 2026, we welcomed 43 new team members across engineering, sales, customer success & solutions, marketing, and operations. Reach was founded to close the gap between knowing where you're exposed and actually fixing it. That mission doesn’t scale without the right people. Growth is exciting, but aligned growth—with the right people, at the right time, for the right mission—is what really matters.

Optimize Microsoft Defender for Office 365 Controls | Demo Video

Microsoft Defender for Office 365 protects against phishing, malware, and malicious links across email and collaboration tools. But as environments scale and settings are changed, your Defender security controls can drift away from security baselines and degrade your security posture. Reach continuously analyzes your Defender deployment to find and fix misconfigurations, activate unused capabilities, and stop configuration drift.

10 Hidden Cybersecurity Misconfigurations

In 2025, organizations spent billions on security, deploying EDR/XDR, SASE, firewalls, identity platforms, email security, web security, and more. And yet, breaches persist. The reason often is not a zero-day, an advanced persistent threat, or a cutting-edge exploit. It is far more mundane. Misconfigurations across identity, endpoint, network, and email/web security controls remain among the top root causes of incidents.

What is Configuration Drift? 5 Best Practices for Your Team's Security Posture

Security configurations are not static. They evolve over time due to software updates, policy changes, emergency patches, and human intervention. While these changes are often necessary, they can lead to configuration drift, a gradual misalignment between an organization’s security controls and its intended security policies.

A Comprehensive Guide to Continuous Threat Exposure Management (CTEM)

Continuous Threat Exposure Management is a continuous security framework for identifying, assessing, validating, and reducing the exposures that matter most to an organization. Rather than treating every exposure, alert, or control issue as equally urgent, CTEM helps organizations focus on the exposures that are actually reachable, relevant to likely attack paths, and meaningful in a business context.