Threat Research​

  • CyberArk 2024 Identity Security Education Threat Landscape Infographic

    CyberArk 2024 Identity Security Education Threat Landscape Infographic

    The CyberArk 2024 Identity Security Threat Landscape Infographic for Education, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-party

    Read More
  • CyberArk Named a Leader in the 2023 Gartner® Magic Quadrant™ for Privileged Access Management – again.

    View the Report
  • CyberArk 2024 Identity Security Public Sector Threat Landscape Infographic

    CyberArk 2024 Identity Security Public Sector Threat Landscape Infographic

    The CyberArk 2024 Identity Security Threat Landscape Infographic for Public Sector, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-party

    Read More
  • CyberArk 2024 Identity Security Healthcare Threat Landscape Infographic

    CyberArk 2024 Identity Security Healthcare Threat Landscape Infographic

    The CyberArk 2024 Identity Security Threat Landscape Infographic for Healthcare, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-party

    Read More
  • CyberArk 2024 Identity Security Financial Services Threat Landscape Infographic

    CyberArk 2024 Identity Security Financial Services Threat Landscape Infographic

    The CyberArk 2024 Identity Security Threat Landscape Infographic for Financial Services, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-

    Read More
  • The Current State of Browser Cookies

    The Current State of Browser Cookies

    What Are Cookies When you hear “cookies,” you may initially think of the delicious chocolate chip ones. However, web cookies function quite differently than their crumbly-baked counterparts....

    Read Blog
  • Balancing Security and Resources: Endpoint Least Privilege in Corporate Environments30:58

    Balancing Security and Resources: Endpoint Least Privilege in Corporate Environments

    View this webinar to understand how CyberArk helps mid-market organizations effectively enforce least privilege with automation to ensure success even with limited resources and giving customers quick

    Watch Video
  • You Can’t Always Win Racing the (Key)cloak

    You Can’t Always Win Racing the (Key)cloak

    Web Race Conditions – Success and Failure – a Keycloak Case Study In today’s connected world, many organizations’ “keys to the kingdom” are held in identity and access management (IAM) solutions;...

    Read Blog
  • Interview: Embracing a Unified Identity-Centered Zero Trust Approach12:45

    Interview: Embracing a Unified Identity-Centered Zero Trust Approach

    Watch this video interview with Amit Chhikara, principal in Deloitte Advisory's cyber risk and privileged access management practices, and Clay Rogers, vice president, global strategic alliances

    Watch Video
  • Operation Grandma: A Tale of LLM Chatbot Vulnerability

    Operation Grandma: A Tale of LLM Chatbot Vulnerability

    Who doesn’t like a good bedtime story from Grandma? In today’s landscape, more and more organizations are turning to intelligent chatbots or large language models (LLMs) to boost service quality...

    Read Blog
  • CyberArk 2024 Identity Security Threat Landscape EMEA Report

    CyberArk 2024 Identity Security Threat Landscape EMEA Report

    CyberArk 2024 Identity Security Threat Landscape EMEA Report provides detailed insights on identity-related cybersecurity threats and technology trends.

    Read More
  • Tales from the Trenches: A Fireside Chat with CyberArk's Incident Response & Red Teams47:21

    Tales from the Trenches: A Fireside Chat with CyberArk's Incident Response & Red Teams

    Attackers are increasingly successful in gaining access to systems. How prepared are you to defend against the latest attack methods?

    Watch Video
  • The Hacker’s Guide to The Cosmos (SDK): Stealing Millions from the Blockchain

    The Hacker’s Guide to The Cosmos (SDK): Stealing Millions from the Blockchain

    Introduction Welcome, fellow travelers of the Cosmos! While we may not be traversing the stars on a spaceship, we are all interconnected through the powerful network of blockchains. Unfortunately,...

    Read Blog
  • A Deep Dive into Penetration Testing of macOS Applications (Part 3)

    A Deep Dive into Penetration Testing of macOS Applications (Part 3)

    Introduction This is the final installment of the blog series “A Deep Dive into Penetration Testing of macOS Applications.” Previously, we discussed the structure of macOS applications and their...

    Read Blog
  • APT29’s Attack on Microsoft: Tracking Cozy Bear’s Footprints

    APT29’s Attack on Microsoft: Tracking Cozy Bear’s Footprints

    A new and concerning chapter has unfolded in these troubled times of geopolitical chaos. The Cozy Bear threat actor has caused significant breaches targeting Microsoft and HPE, and more are likely...

    Read Blog
  • Ransomware’s PLAYing a Broken Game

    Ransomware’s PLAYing a Broken Game

    Abstract The Play ransomware group is one of the most successful ransomware syndicates today. All it takes is a quick peek with a disassembler to know why this group has become infamous. This is...

    Read Blog
  • CyberArk Labs’ 2023 Threat Research Highlights

    CyberArk Labs’ 2023 Threat Research Highlights

    Throughout an eventful 2023, CyberArk Labs remained focused on uncovering emerging cyberattack patterns and producing threat research aimed at helping organizations strengthen their identity...

    Read Blog
  • SafeNet: Securing Your Network From Yourself

    SafeNet: Securing Your Network From Yourself

    TL;DR Whether working at home or in the office, when conducting cybersecurity research, investigating the dark web forums or engaging with any dangerous part of the internet, staying safe is...

    Read Blog
  • Identity and Access Management is Leading the Way for Identity Security

    Identity and Access Management is Leading the Way for Identity Security

    This ESG eBook details how identity & access management has evolved in recent years and what you can do to bolster your identity security.

    Read More
  • Okta Breach Update - More Widespread than Originally Disclosed13:12

    Okta Breach Update - More Widespread than Originally Disclosed

    CyberArk expert Andy Thompson analyzes the latest updates on Okta’s October 2023 breach (customer support system) with an emphasis on best practices.

    Watch Video
  • Fuzzer-V

    Fuzzer-V

    TL;DR An overview of a fuzzing project targeting the Hyper-V VSPs using Intel Processor Trace (IPT) for code coverage guided fuzzing, built upon WinAFL, winipt, HAFL1, and Microsoft’s IPT.sys....

    Read Blog
  • loading
    Loading More...