‘Plague’ malware exploits Pluggable Authentication Module to breach Linux systems
Understanding the ‘Plague’ Pluggable Authentication Module (PAM*) backdoor in Linux systems ‘Plague’ represents a newly identified Linux backdoor that has quietly evaded detection by traditional...
Read Blog
In code we trust: How to create and enforce trust of custom code at scale
In today’s threat landscape, the software supply chain has become a prime target for attackers. From injecting malicious code into legitimate applications to exploiting elevated privileges on...
Read Blog
Modern application control, done right with least privilege
When attackers gain access to a single endpoint—like a developer’s workstation or an HR system—it’s often game over. With some skill and patience, that foothold can escalate into full-blown...
Read Blog
How the 16 billion password leak impacts your security strategy
The June 2025 disclosure that over 16 billion passwords were leaked has raised significant concerns in the digital community. Reports suggest that many of these credentials are recycled from...
Read Blog
Rise of the privileged access guardian: An admin’s origin story
Alex was the kind of IT administrator who kept everything humming smoothly behind the scenes at QuantumAxis Corp. Servers, user accounts, random requests at 4:55 PM on Fridays—he put out the fires...
Read Blog
Unified Security: Bridging the Gaps with a Defense-in-Depth Approach
The identity is the main attack vector for cybercriminals, with cybercriminals using stolen identity to infiltrate the organization, move laterally and vertically throughout the organization, and...
Read Blog