FirstWatch INTSUM Report: A Threat Research Series (Part 1/3)

In 2025, many major intrusions did not begin with malware or zero-days.
They began with trusted access.

Compromised OAuth tokens, exposed CI/CD secrets, and stolen software supply chain identities enabled attackers to move through enterprise environments using legitimate workflows, often without triggering traditional detection signals.

As SaaS integrations, automation pipelines, and developer ecosystems become more interconnected, identity and authorization artifacts are emerging as the new security perimeter.

This intelligence summary explores how adversaries are exploiting trust relationships on a scale and what security teams must prioritize to detect and contain these attacks before they spread.

In this report, you will discover

  • Key threat patterns that shaped identity-driven intrusions in 2025
  • Real-world campaign insights across SaaS, CI/CD, and open-source ecosystems
  • Practical detection and hunting considerations for modern SOC teams
  • Strategic response priorities to reduce exposure from compromised tokens and secrets

Download the report to learn how trust is being exploited and how to stay ahead.

Download Now! →

Accelerate Your Threat Detection and Response Today!