Threat Research​

  • Captain MassJacker Sparrow: Uncovering the Malware’s Buried Treasure

    Captain MassJacker Sparrow: Uncovering the Malware’s Buried Treasure

    Cryptojacking malware—a type of malware that tries to steal cryptocurrencies from users on infected machines. Curiously, this kind of malware isn’t nearly as famous as ransomware or even...

    Read Blog
  • CyberArk Named a Leader in the 2024 Gartner® Magic Quadrant™ for Privileged Access Management – again.

    View the Report
  • Let’s Be Authentik: You Can’t Always Leak ORMs

    Let’s Be Authentik: You Can’t Always Leak ORMs

    Introduction Identity providers (IdPs) or Identity and Access Management (IAM) solutions are essential for implementing secure and efficient user authentication and authorization in every...

    Read Blog
  • How Secure Is Your OAuth? Insights from 100 Websites

    How Secure Is Your OAuth? Insights from 100 Websites

    You might not recognize the term “OAuth,” otherwise known as Open Authorization, but chances are you’ve used it without even realizing it. Every time you log into an app or website using Google,...

    Read Blog
  • The US Treasury Dept Breach: Analysis of the Attack43:10

    The US Treasury Dept Breach: Analysis of the Attack

    Watch this CyberArk Labs webinar for an in-depth analysis of the Dec. 2024 U.S. Treasury cyberattack, its causes and mitigation strategies.

    Watch Video
  • Securing Against Generative AI-powered Security Events

    Securing Against Generative AI-powered Security Events

    The increasing complexity of generative AI-driven cyberthreats demands a more diligent approach to how organizations detect and respond to these dangers

    Read More
  • Prepare for 2025 Cyberthreats with Research Insights from CyberArk Labs

    Prepare for 2025 Cyberthreats with Research Insights from CyberArk Labs

    The year 2025 started with a bang, with these cybersecurity stories making headlines in the first few days: New details emerged on a “major” identity-related security incident involving the U.S....

    Read Blog
  • Emerging Threats in Identity Security What You Need to Know29:48

    Emerging Threats in Identity Security What You Need to Know

    Learn about recent hacks, emerging attack methods, newly identified threats and essential mitigation strategies.

    Watch Video
  • IDC InfoBrief: Industry Playbook for Identity Security | Addressing Human and Machine Identity Trends

    IDC InfoBrief: Industry Playbook for Identity Security | Addressing Human and Machine Identity Trends

    Explore an IDC InfoBrief sponsored by CyberArk, revealing the challenges and trends in identity security across industries. Understand the risks and solutions for managing human and machine identities

    Read More
  • Teach Yourself Kubiscan in 7 Minutes (or Less…)

    Teach Yourself Kubiscan in 7 Minutes (or Less…)

    While Kubernetes’ Role-based access control (RBAC) authorization model is an essential part of securing Kubernetes, managing it has proven to be a significant challenge — especially when dealing...

    Read Blog
  • ByteCodeLLM – Privacy in the LLM Era: Byte Code to Source Code

    ByteCodeLLM – Privacy in the LLM Era: Byte Code to Source Code

    TL;DR ByteCodeLLM is a new open-source tool that harnesses the power of Local Large Language Models (LLMs) to decompile Python executables. Furthermore, and importantly, it prioritizes data...

    Read Blog
  • White FAANG: Devouring Your  Personal Data

    White FAANG: Devouring Your Personal Data

    Generated using Ideogram Abstract Privacy is a core aspect of our lives. We have the fundamental right to control our personal data, physically or virtually. However, as we use products from...

    Read Blog
  • CyberArk Labs Deconstructing Attacker Methods in Recent Breaches48:05

    CyberArk Labs Deconstructing Attacker Methods in Recent Breaches

    Analysis of significant breaches of the year and the methodologies employed by cyber adversaries.

    Watch Video
  • Discovering Hidden Vulnerabilities in Portainer with CodeQL

    Discovering Hidden Vulnerabilities in Portainer with CodeQL

    Recently, we researched a project on Portainer, the go-to open-source tool for managing Kubernetes and Docker environments. With more than 30K stars on GitHub, Portainer gives you a user-friendly...

    Read Blog
  • Anatomy of an LLM RCE

    Anatomy of an LLM RCE

    As large language models (LLMs) become more advanced and are granted additional capabilities by developers, security risks increase dramatically. Manipulated LLMs are no longer just a risk of...

    Read Blog
  • GenAI: Promise, Potential – and Pitfalls19:15

    GenAI: Promise, Potential – and Pitfalls

    CyberArk’s CIO shares his perspective on AI trends, threats, CyberArk’s approach to adoption and best practices for risk reduction.

    Watch Video
  • A Security Analysis of Azure DevOps Job Execution

    A Security Analysis of Azure DevOps Job Execution

    In software development, CI/CD practices are now standard, helping to move code quickly and efficiently from development to production. Azure DevOps, previously known as Team Foundation Server...

    Read Blog
  • Identity Security Brings a Competitive Advantage to Midsize Enterprises Leveraging New Technologies for Business Growth

    Identity Security Brings a Competitive Advantage to Midsize Enterprises Leveraging New Technologies for Business Growth

    In this paper, ESG Analysts describe how midsize organizations, with limited resources, can gain a competitive advantage when strong identity security is in place.

    Read More
  • Intelligent Privilege Controls™: your strongest ally in the face of attacks.1:10

    Intelligent Privilege Controls™: your strongest ally in the face of attacks.

    See how Intelligent Privilege Controls™ are dynamically applied to protect a user’s access when it becomes high-risk.

    Watch Video
  • AI Treason: The Enemy Within

    AI Treason: The Enemy Within

    tl;dr: Large language models (LLMs) are highly susceptible to manipulation, and, as such, they must be treated as potential attackers in the system. LLMs have become extremely popular and serve...

    Read Blog
  • A Brief History of Game Cheating

    A Brief History of Game Cheating

    Over the short span of video game cheating, both cheaters and game developers have evolved in many ways; this includes everything from modification of important game variables (like health) by...

    Read Blog
  • loading
    Loading More...