Threat Research​

  • Phishing as a Service

    Phishing as a Service

    Introduction Everyone knows what phishing is. It has been around for more than two decades. Now it seems that phishing is more accessible than before. This blog covers how malicious actors can...

    Read Article
  • CyberArk Named a Leader in the 2022 Gartner® Magic Quadrant™ for Privileged Access Management – again.

    View the Report
  • The Linux Kernel and the Cursed Driver

    The Linux Kernel and the Cursed Driver

    Introduction NTFS is a filesystem developed by Microsoft that was introduced in 1993. Since then, it has become the primary filesystem for Windows. In recent years, the need for an NTFS...

    Read Article
  • Breaking Docker Named Pipes SYSTEMatically: Docker Desktop Privilege Escalation – Part 1

    Breaking Docker Named Pipes SYSTEMatically: Docker Desktop Privilege Escalation – Part 1

    Everything started when I was researching Windows containers. It required installing Docker Desktop for Windows, and I couldn’t help but notice that there were many Docker processes. Since some of...

    Read Article
  • Inglourious Drivers – A Journey of Finding Vulnerabilities in Drivers

    Inglourious Drivers – A Journey of Finding Vulnerabilities in Drivers

    TL;DR I discovered multiple bugs in OEM vendors for peripheral devices, which affected many users of these OEM vendors (Razer, EVGA, MSI, AMI). Many of the vulnerabilities originated in a...

    Read Article
  • Securing Application Identities in 2023: Five Trends And A Prediction47:51

    Securing Application Identities in 2023: Five Trends And A Prediction

    Join Kurt Sand, General Manager of DevSecOps at CyberArk, as he sits down with The Reg’s Tim Phillips to discuss the top emerging trends in the DevSecOps space, along with one big future prediction.

    Watch Video
  • Chatting Our Way Into Creating a Polymorphic Malware

    Chatting Our Way Into Creating a Polymorphic Malware

    Abstract ChatGPT took the world by storm being released less than two months ago, it has become prominent and is used everywhere, for a wide variety of tasks – from automation tasks to the...

    Read Article
  • Six Takeaways from Recent Ransomware Attacks

    Six Takeaways from Recent Ransomware Attacks

    2022 ransomware attack learnings can inform 2023 cybersecurity strategies, helping organizations combat threats and reduce risk with greater confidence. The CyberArk 2022 Identity Security Threat...

    Read Article
  • CyberArk Labs’ 2022 Threat Research in Review

    CyberArk Labs’ 2022 Threat Research in Review

    Cyber defenders need timely, accurate threat intelligence to protect their organizations. This is what drives our CyberArk Labs team to produce innovative research, expose new attack methods and...

    Read Article
  • Revisiting Major 2022 Breaches and Cybersecurity Events

    Revisiting Major 2022 Breaches and Cybersecurity Events

    Before we ring in the new year, we’re reflecting on some of the biggest cybersecurity events of 2022. It’s been a stressful 12 months for security teams, to say the least. Many open cybersecurity...

    Read Article
  • What I Learned from Analyzing a Caching Vulnerability in Istio

    What I Learned from Analyzing a Caching Vulnerability in Istio

    TL;DR Istio is an open-source service mash that can layer over applications. Studying CVE-2021-34824 in Istio will allow us to dive into some concepts of Istio and service meshes in general. We...

    Read Article
  • Decentralized Identity Attack Surface – Part 2

    Decentralized Identity Attack Surface – Part 2

    Introduction This is the second part of our Decentralized Identity (DID) blog series. In case you’re not familiar with DID concepts, we highly encourage you to start with the first part. This time...

    Read Article
  • 2023 Cybersecurity Predictions from CyberArk Labs

    2023 Cybersecurity Predictions from CyberArk Labs

    It’s been an eventful 2022 and, based on what our CyberArk Labs team is observing, 2023 will introduce yet another chapter of cybersecurity threats and challenges, along with some new...

    Read Article
  • Decentralized Identity Attack Surface – Part 1

    Decentralized Identity Attack Surface – Part 1

    Introduction Who are you? That’s a hard question to answer. Many philosophers have been fascinated with this question for years. Who are you in cyberspace? Your digital identity is comprised of...

    Read Article
  • Fantastic Rootkits: And Where to Find Them (Part 1)

    Fantastic Rootkits: And Where to Find Them (Part 1)

    Introduction In this blog series, we will cover the topic of rootkits — how they are built and the basics of kernel driver analysis — specifically on the Windows platform. In this first part, we...

    Read Article
  • Unpacking the Uber Breach

    Unpacking the Uber Breach

    In the days following the September 15 Uber breach disclosure, much has been written about how one, allegedly 18-year-old attacker was able to successfully infiltrate the ridesharing giant’s IT...

    Read Article
  • QR Codes in a Post Pandemic World46:46

    QR Codes in a Post Pandemic World

    QR codes are accessible, easy to produce and seemingly, here to stay. They’re also a perfect way for cyber criminals to snag your employee’s personal information.

    Watch Video
  • Decentralized Identity on the Blockchain Promises a New Era of Consumer Privacy. But Can It Deliver?

    Decentralized Identity on the Blockchain Promises a New Era of Consumer Privacy. But Can It Deliver?

    What is my identity? I’m not having an existential moment; instead, I’m asking how others recognize me. How do they know for sure that I am who I say I am? In the physical world,...

    Read Article
  • LockBit 3.0 Ransomware Learns from Defenders, Launches Bug Bounty Program, Begs “Hack Me”

    LockBit 3.0 Ransomware Learns from Defenders, Launches Bug Bounty Program, Begs “Hack Me”

    The evolution of LockBit – one of the largest ransomware as a service (RaaS) operations in history – exemplifies continued attack commoditization and underground innovation. Since LockBit 3.0 (aka...

    Read Article
  • Don’t Fall for MFA Fatigue or Next-Level Phishing Attacks

    Don’t Fall for MFA Fatigue or Next-Level Phishing Attacks

    Phishing attacks are pervasive, whether you work at a global telecommunications company or a small local retail shop. Fortunately, employees have come a long way in spotting phishing attempts,...

    Read Article
  • Cyber Attack Commoditization and the Rise of Access-as-a-Service

    Cyber Attack Commoditization and the Rise of Access-as-a-Service

    Despite lingering, dated depictions of dark-hooded figures, cyber crime has matured into a highly professional business sector. With strong backing by organized crime syndicates and nation states,...

    Read Article
  • loading
    Loading More...