Threat Research​

  • A Brief History of Game Cheating

    A Brief History of Game Cheating

    Over the short span of video game cheating, both cheaters and game developers have evolved in many ways; this includes everything from modification of important game variables (like health) by...

    Read Blog
  • CyberArk Named a Leader in the 2023 Gartner® Magic Quadrant™ for Privileged Access Management – again.

    View the Report
  • Double Dipping Cheat Developer Gets Caught Red-Handed

    Double Dipping Cheat Developer Gets Caught Red-Handed

    Following our post “A Brief History of Game Cheating,” it’s safe to say that cheats, no matter how lucrative or premium they might look, always carry a degree of danger. Today’s story revolves...

    Read Blog
  • CyberArk 2024 Identity Security Education Threat Landscape Infographic

    CyberArk 2024 Identity Security Education Threat Landscape Infographic

    The CyberArk 2024 Identity Security Threat Landscape Infographic for Education, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-party

    Read More
  • CyberArk 2024 Identity Security Manufacturing Threat Landscape Infographic

    CyberArk 2024 Identity Security Manufacturing Threat Landscape Infographic

    The CyberArk 2024 Identity Security Threat Landscape Infographic for Manufacturing, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-party

    Read More
  • CyberArk 2024 Identity Security Public Sector Threat Landscape Infographic

    CyberArk 2024 Identity Security Public Sector Threat Landscape Infographic

    The CyberArk 2024 Identity Security Threat Landscape Infographic for Public Sector, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-party

    Read More
  • CyberArk 2024 Identity Security Healthcare Threat Landscape Infographic

    CyberArk 2024 Identity Security Healthcare Threat Landscape Infographic

    The CyberArk 2024 Identity Security Threat Landscape Infographic for Healthcare, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-party

    Read More
  • CyberArk 2024 Identity Security Technology Threat Landscape Infographic

    CyberArk 2024 Identity Security Technology Threat Landscape Infographic

    The CyberArk 2024 Identity Security Threat Landscape Infographic for Technology, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-party

    Read More
  • CyberArk 2024 Identity Security Financial Services Threat Landscape Infographic

    CyberArk 2024 Identity Security Financial Services Threat Landscape Infographic

    The CyberArk 2024 Identity Security Threat Landscape Infographic for Financial Services, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-

    Read More
  • Identity Crisis: The Curious Case of a Delinea Local Privilege Escalation Vulnerability

    Identity Crisis: The Curious Case of a Delinea Local Privilege Escalation Vulnerability

    During a recent customer engagement, the CyberArk Red Team discovered and exploited an Elevation of Privilege (EoP) vulnerability (CVE-2024-39708) in Delinea Privilege Manager (formerly Thycotic...

    Read Blog
  • The Current State of Browser Cookies

    The Current State of Browser Cookies

    What Are Cookies When you hear “cookies,” you may initially think of the delicious chocolate chip ones. However, web cookies function quite differently than their crumbly-baked counterparts....

    Read Blog
  • Balancing Security and Resources: Endpoint Least Privilege in Corporate Environments30:58

    Balancing Security and Resources: Endpoint Least Privilege in Corporate Environments

    View this webinar to understand how CyberArk helps mid-market organizations effectively enforce least privilege with automation to ensure success even with limited resources and giving customers quick

    Watch Video
  • You Can’t Always Win Racing the (Key)cloak

    You Can’t Always Win Racing the (Key)cloak

    Web Race Conditions – Success and Failure – a Keycloak Case Study In today’s connected world, many organizations’ “keys to the kingdom” are held in identity and access management (IAM) solutions;...

    Read Blog
  • Interview: Embracing a Unified Identity-Centered Zero Trust Approach12:45

    Interview: Embracing a Unified Identity-Centered Zero Trust Approach

    Watch this video interview with Amit Chhikara, principal in Deloitte Advisory's cyber risk and privileged access management practices, and Clay Rogers, vice president, global strategic alliances

    Watch Video
  • Operation Grandma: A Tale of LLM Chatbot Vulnerability

    Operation Grandma: A Tale of LLM Chatbot Vulnerability

    Who doesn’t like a good bedtime story from Grandma? In today’s landscape, more and more organizations are turning to intelligent chatbots or large language models (LLMs) to boost service quality...

    Read Blog
  • CyberArk 2024 Identity Security Threat Landscape EMEA Report

    CyberArk 2024 Identity Security Threat Landscape EMEA Report

    CyberArk 2024 Identity Security Threat Landscape EMEA Report provides detailed insights on identity-related cybersecurity threats and technology trends.

    Read More
  • Tales from the Trenches: A Fireside Chat with CyberArk's Incident Response & Red Teams47:21

    Tales from the Trenches: A Fireside Chat with CyberArk's Incident Response & Red Teams

    Attackers are increasingly successful in gaining access to systems. How prepared are you to defend against the latest attack methods?

    Watch Video
  • The Hacker’s Guide to The Cosmos (SDK): Stealing Millions from the Blockchain

    The Hacker’s Guide to The Cosmos (SDK): Stealing Millions from the Blockchain

    Introduction Welcome, fellow travelers of the Cosmos! While we may not be traversing the stars on a spaceship, we are all interconnected through the powerful network of blockchains. Unfortunately,...

    Read Blog
  • A Deep Dive into Penetration Testing of macOS Applications (Part 3)

    A Deep Dive into Penetration Testing of macOS Applications (Part 3)

    Introduction This is the final installment of the blog series “A Deep Dive into Penetration Testing of macOS Applications.” Previously, we discussed the structure of macOS applications and their...

    Read Blog
  • APT29’s Attack on Microsoft: Tracking Cozy Bear’s Footprints

    APT29’s Attack on Microsoft: Tracking Cozy Bear’s Footprints

    A new and concerning chapter has unfolded in these troubled times of geopolitical chaos. The Cozy Bear threat actor has caused significant breaches targeting Microsoft and HPE, and more are likely...

    Read Blog
  • Ransomware’s PLAYing a Broken Game

    Ransomware’s PLAYing a Broken Game

    Abstract The Play ransomware group is one of the most successful ransomware syndicates today. All it takes is a quick peek with a disassembler to know why this group has become infamous. This is...

    Read Blog
  • loading
    Loading More...