Blog Posts
-
Is autofill safe? Clickjacking risks and security tradeoffs explained
When new security research hits the headlines, it often sparks a predictable wave of worry: should we turn off features we rely on? Should we rethink basic workflows? That’s exactly the case with...
-
Why secret sprawl may be your biggest security threat (and how to help fix it)
Picture this: You’re having your morning coffee when your phone buzzes with the kind of alert that makes security professionals break into a cold sweat. A single API key, leaked on GitHub months...
-
Cheaters never win: large-scale campaign targets gamers who cheat with StealC and cryptojacking
A sprawling cyber campaign is turning gamers’ hunger to gain an edge into a massive payday for threat actors who are leveraging over 250 malware samples to steal credentials and cryptocurrencies....
-
Defeating Microsoft EPM in the Race to Admin: a Tale of a LPE vulnerability
Introduction Not too long ago I read an interesting blogpost by SpecterOps about Microsoft EPM that got my attention as I was not aware of this Microsoft product/feature. It was interesting to...
-
Salesloft Drift incident overview and CyberArk’s response
It was recently reported that Salesloft’s Drift application was breached, allowing unauthorized access to its customers’ Salesforce data and affecting hundreds of organizations, including...
-
Securing cloud console and CLI access for agile software development
Fast-moving cloud environments demand speed, but without the right access controls they invite risk. Resources such as virtual machines, containers, and services are created, modified, and...
-
Declutter your crypto: Machine identity security for a post-quantum world
In a bad dream, you open the closet. You think you know exactly what’s in there: a few SSH keys, a bunch of TLS certificates, and some secrets like API keys locked in what you...
-
A CISO’s guide to post-quantum readiness: How to build crypto agility now
The quantum threat isn’t theoretical—it’s operational. Quantum computing is rapidly shifting from research to reality, forcing chief information security officers (CISOs) to rethink cryptography,...
-
How external attackers and malicious insiders exploit standing privileges in the cloud
For many of us, the term “cloud security breach” conjures meticulous attack plans executed by sophisticated criminal syndicates. But in reality, “attacks” can be far more mundane: maybe some...
-
Rethinking secondary accounts: How zero standing privileges (ZSP) reshape identity security
For years, separating day-to-day user activity from administrative tasks through secondary accounts was considered a security best practice. But as identity threats grow more sophisticated and...
-
Bridging runtime visibility and secrets management in Kubernetes with Sweet Security and CyberArk
Secrets management is a foundational pillar of cloud security. It enables secure storage, rotation, and access control for application secrets. But in Kubernetes environments, secrets don’t just...
-
CIO POV: What am I actually supposed to do with agentic AI?
For every enterprise CISO in the world right now, the burning question isn’t about cloud, TPRM, or internal threats. It’s about how to securely and responsibly adopt AI—specifically, agentic AI,...
-
CyberArk empowers Australia’s cyber resilience with IRAP assessment completion at the protected level
As ransomware strains hospital operations and supply‑chain attacks target energy grids, Australia’s public and regulated sectors need proven cyber resilience. At the heart of most breaches lie...
-
‘Plague’ malware exploits Pluggable Authentication Module to breach Linux systems
Understanding the ‘Plague’ Pluggable Authentication Module (PAM*) backdoor in Linux systems ‘Plague’ represents a newly identified Linux backdoor that has quietly evaded detection by traditional...
-
The life and death of an AI agent: Identity security lessons from the human experience
AI agents are on the rise. They can spin up, act independently, use tools, and make decisions—often without real-time human oversight. They promise incredible productivity but also introduce new...
-
CyberArk Secure Cloud Access achieves CSA STAR Level 1 certification
When you hand over the keys to your cloud, you’d better know who’s holding them—and for how long. In a world where speed is everything and complexity is the norm, organizations need more than...
-
Container security at scale: Strengthening software supply chains
Modern applications have undergone a paradigm shift, with containers becoming the default choice for deployment. While their flexibility and scalability are well-recognized, their adoption has...
-
CyberArk earns Wiz partner award for advancing cloud identity innovation
Cloud complexity is growing. So are the risks—and the opportunities. As organizations scale their infrastructure across hybrid environments to innovate quickly, security strategies must evolve...
-
Illusion of control: Why securing AI agents challenges traditional cybersecurity models
Enterprise security teams commonly focus on controlling AI agent conversations through prompt filters and testing edge cases to prevent unauthorized information access. While these measures...
-
Responding to ToolShell: A Microsoft SharePoint zero-day vulnerability
What is the ToolShell exploit? A newly discovered exploit, “ToolShell,” is fueling a wave of targeted attacks against on-premises Microsoft SharePoint servers. The zero-day exploit chains two...
-
Loading More...