Threat Research
-
The Hacker’s Guide to The Cosmos (SDK): Stealing Millions from the Blockchain
Introduction Welcome, fellow travelers of the Cosmos! While we may not be traversing the stars on a spaceship, we are all interconnected through the powerful network of blockchains. Unfortunately,...
-
CyberArk Named a Leader in the 2023 Gartner® Magic Quadrant™ for Privileged Access Management – again.
View the Report -
A Deep Dive into Penetration Testing of macOS Applications (Part 3)
Introduction This is the final installment of the blog series “A Deep Dive into Penetration Testing of macOS Applications.” Previously, we discussed the structure of macOS applications and their...
-
Ransomware’s PLAYing a Broken Game
Abstract The Play ransomware group is one of the most successful ransomware syndicates today. All it takes is a quick peek with a disassembler to know why this group has become infamous. This is...
-
SafeNet: Securing Your Network From Yourself
TL;DR Whether working at home or in the office, when conducting cybersecurity research, investigating the dark web forums or engaging with any dangerous part of the internet, staying safe is...
-
Identity and Access Management is Leading the Way for Identity Security
This ESG eBook details how identity & access management has evolved in recent years and what you can do to bolster your identity security.
-
13:12
Okta Breach Update - More Widespread than Originally Disclosed
CyberArk expert Andy Thompson analyzes the latest updates on Okta’s October 2023 breach (customer support system) with an emphasis on best practices.
-
Fuzzer-V
TL;DR An overview of a fuzzing project targeting the Hyper-V VSPs using Intel Processor Trace (IPT) for code coverage guided fuzzing, built upon WinAFL, winipt, HAFL1, and Microsoft’s IPT.sys....
-
28:07
Assessing the Attack on Okta’s Support Unit Mitigate Your Risk with Six Steps and New CyberArk HAR Tool
CyberArk's Khizar Sultan and Andy Thompson deconstruct the Okta breach and share strategies you can take to mitigate the risks of identity attacks.
-
46:01
Anatomy of the MGM Hack: A CyberArk Labs Perspective
CyberArk's resident experts, Khizar Sultan and Andy Thompson, examine the root causes and lessons learned from the MGM Resorts attack.
-
The MGM Resorts Attack: Initial Analysis
The recent cyberattack on MGM Resorts International has raised serious concerns about the security of sensitive data and the vulnerabilities organizations face in today’s digital landscape. In...
-
NVMe: New Vulnerabilities Made Easy
As vulnerability researchers, our primary mission is to find as many vulnerabilities as possible with the highest severity as possible. Finding vulnerabilities is usually challenging. But could...
-
Fantastic Rootkits: And Where To Find Them (Part 3) – ARM Edition
Introduction In this blog, we will discuss innovative rootkit techniques on a non-traditional architecture, Windows 11 on ARM64. In the prior posts, we covered rootkit techniques applied to a...
-
A Deep Dive into Penetration Testing of macOS Applications (Part 2)
Introduction This is the second part of the “A Deep Dive into Penetration Testing of macOS Application” blog series. In the first part, we learned about macOS applications and their structure and...
-
A Deep Dive into Penetration Testing of macOS Applications (Part 1)
Introduction As many of us know, there are a lot of guides and information on penetration testing applications on Windows and Linux. Unfortunately, a step-by-step guide doesn’t exist in the macOS...
-
51:29
IMPACT 2023 Panel - Measure and Deliver Value with Identity Security
Join Accenture, Deloitte, PwC and KPMG on this panel during IMPACT 2023, CyberArk's annual customer and industry conference, around measure and deliver value with Identity Security.
-
CyberArk 2023 Identity Security Threat Landscape Infographic
Identity-led cybersecurity exposure is on the rise.
-
CyberArk 2023 Identity Security Threat Landscape Report
AI Tool Use, Employee Churn and Economic Pressures Fuel the Identity Attack Surface
-
Analyzing 3 Offensive AI Attack Scenarios
Artificial intelligence (AI) is transforming modern society at unprecedented speed. It can do your homework, help you make better investment decisions, turn your selfie into a Renaissance painting...
-
55:51
How Dark Web Credentials Lead to a Software Supply Chain Attack
2023 Attack and Defend Virtual Series Session One
-
How to Write a PoC for an Uninitialized Smart Contract Vulnerability in BadgerDAO Using Foundry
TL;DR In this post, we’re going to learn how Foundry can be used to write a proof of concept (PoC) for uninitialized smart contract vulnerabilities. We will take a look at and exploit a simple...
- Loading More...