• Shamoon Attack Reinforces Risks of Privileged Credential Compromise

    Malware like Shamoon is analogous to finding an unexploded WWII bomb in the ground. It’s been seemingly dormant for years, but when uncovered, it remains incredibly dangerous with the potential to devastate. Agile cyber attackers have become expert at reconstituting …

  • CyberArk Labs Research: Stealing Service Credentials to Achieve Full Domain Compromise

    Executive Summary The CyberArk Labs team has discovered a way to harvest encrypted service credentials from the Local Security Authority (LSA) Secrets registry hive and inject them into a new malicious service to achieve lateral movement and full domain compromise. …

  • Tune In To Our Webcast Series: On the Front Lines

    We recently kicked off a new webcast series, On the Front Lines. Led by our team of system engineer experts, these webcasts take place on Tuesdays at 2:00 p.m. EDT offering information on cyber security trends, technical details on security …

  • Introducing the CyberArk 2015 Global Advanced Threat Landscape Survey

    Today we unveiled the findings from our 2015 Global Advanced Threat Landscape Survey. Now in its ninth year, this report pinpoints cyber security trends and emerging risks based upon a compilation of interviews with 673 IT security and C-level executives …