Threat Research​

  • CISA on Ukraine Cyber Attacks: Are You at Risk?

    CISA on Ukraine Cyber Attacks: Are You at Risk?

    Reports of a large-scale cyber attack targeting Ukrainian organizations and several government department websites have emerged in recent days. In response, the Cybersecurity & Infrastructure...

    Read Article
  • Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file system access to client machines and more

    Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file system access to client machines and more

    In this blog post we are going to discuss the details of a vulnerability in Windows Remote Desktop Services, which we recently uncovered. We reported the vulnerability to Microsoft in a...

    Read Article
  • Gartner Names CyberArk a Leader in the 2021 Magic Quadrant for PAM

    Download Now
  • 3 Cyber Attacks that Didn’t Get Enough Attention in 2021 (But Probably Should Have)

    3 Cyber Attacks that Didn’t Get Enough Attention in 2021 (But Probably Should Have)

    In 1988, graduate student Robert Tappan Morris created a computer worm and inadvertently launched what many consider to be the world’s first cyber attack. Since that infamous “Morris Worm,” major...

    Read Article
  • Has SolarWinds Transformed Cybersecurity?

    Has SolarWinds Transformed Cybersecurity?

    A year ago, the business world entered 2021 still reeling from the catastrophic SolarWinds attack that impacted thousands of organizations and put software supply chain risks on everyone’s radar —...

    Read Article
  • When Threat Research Goes Wrong: Spectacular Screwups and What to Learn from Them

    When Threat Research Goes Wrong: Spectacular Screwups and What to Learn from Them

    Threat researchers on the cutting edge of cybersecurity have a certain kind of drive — almost a relentless need — to get into the attacker’s mind, solve the “unsolvable” challenge and expose ...

    Read Article
  • Log4j: What to Know. What to Do. And How to Stay Ahead

    Log4j: What to Know. What to Do. And How to Stay Ahead

    In December 2020, a series of network breaches was reported in rapid succession — the beginning of what soon became known as the cyber attack that changed everything. By compromising identities...

    Read Article
  • Cybersecurity Trends for 2022: The Roots of Attacker Innovation

    Cybersecurity Trends for 2022: The Roots of Attacker Innovation

    The Greek philosopher Heraclitus once said “the only constant is change.” This still rings true thousands of years later — particularly as we reflect on 2021, another year marked by continued...

    Read Article
  • How to Use the MITRE ATT&CK Framework to Fight Ransomware Attacks

    How to Use the MITRE ATT&CK Framework to Fight Ransomware Attacks

    Chinese military general Sun Tzu’s treatise The Art of War has been cited over the years by millions of self-help gurus and corporate strategy consultants – and misquoted in a million more...

    Read Article
  • Cracking WiFi at Scale with One Simple Trick

    Cracking WiFi at Scale with One Simple Trick

    How I Cracked 70% of Tel Aviv’s Wifi Networks (from a Sample of 5,000 Gathered WiFi). In the past seven years that I’ve lived in Tel Aviv, I’ve changed apartments four times. Every time I...

    Read Article
  • INTENT Security Research Summit: Explore. Experience. Share.

    INTENT Security Research Summit: Explore. Experience. Share.

    While enterprises fight to stave off relentless attacks, 57% of them are hamstrung by the ever-worsening global cybersecurity skills shortage. An estimated 4.07 million industry positions remain...

    Read Article
  • Fuzzing RDP: Holding the Stick at Both Ends

    Fuzzing RDP: Holding the Stick at Both Ends

    Introduction This post describes the work we’ve done on fuzzing the Windows RDP client and server, the challenges of doing so, and some of the results. The Remote Desktop Protocol (RDP) by...

    Read Article
  • Black Hat Reflections: Supply Chain Attacks, Zero Days and Disclosures

    Black Hat Reflections: Supply Chain Attacks, Zero Days and Disclosures

    Black Hat 2021 had a markedly different tone from previous years. Welcoming remarks explored the strong parallels between cybersecurity and COVID-19 prevention, with founder Jeff Moss asking...

    Read Article
  • Introducing the CyberTalk with CyberArk Podcast Series: On-the-Go Cybersecurity Insights

    Introducing the CyberTalk with CyberArk Podcast Series: On-the-Go Cybersecurity Insights

    Ninety-one percent of cybersecurity practitioners agree they must keep up with their skills, or the organizations they work for are at a significant disadvantage against today’s cyber adversaries,...

    Read Article
  • The Anatomy of the Codecov Breach: A CyberArk Labs Webinar29:32

    The Anatomy of the Codecov Breach: A CyberArk Labs Webinar

    The breach on code testing software vendor Codecov could have easily gone unnoticed for an indefinite amount of time. CyberArk labs presents the anatomy of the CodeCov software supply chain attack

    Watch Video
  • FickerStealer: A New Rust Player in the Market

    FickerStealer: A New Rust Player in the Market

    This blog introduces a new information stealer, written in Rust and interestingly named FickerStealer. In this blog post, we provide an in-depth analysis of this new threat and its obfuscation...

    Read Article
  • Bypassing Windows Hello Without Masks or Plastic Surgery

    Bypassing Windows Hello Without Masks or Plastic Surgery

    Biometric authentication is beginning to see rapid adoption across the enterprise as organizations look to incorporate passwordless solutions to help mitigate the numerous security risks inherent...

    Read Article
  • In Kaseya Supply Chain Ransomware Attack History Repeats Itself

    In Kaseya Supply Chain Ransomware Attack History Repeats Itself

    While many Americans took off early to jump-start the Independence Day weekend, cyber attackers were launching the single biggest ransomware attack in history. It’s estimated that at least 800 to...

    Read Article
  • Best Defense? Our Red Team Lead Reveals 4 MFA Bypass Techniques

    Best Defense? Our Red Team Lead Reveals 4 MFA Bypass Techniques

    Digital transformation, widespread remote work due to the COVID-19 pandemic and ever-increasing reliance on cloud services and infrastructure have all contributed to new enterprise access...

    Read Article
  • Hack(er)-of-All-Trades: Q&A with CyberArk Technical Evangelist Andy Thompson

    Hack(er)-of-All-Trades: Q&A with CyberArk Technical Evangelist Andy Thompson

    We can’t help it. We hear the word “hacker” and our minds instantly go to shadowy figures in dark rooms frantically causing as much malicious digital mayhem as they can. It’s a misconception that...

    Read Article
  • Attacking Kubernetes Clusters Through Your Network Plumbing: Part 2

    Attacking Kubernetes Clusters Through Your Network Plumbing: Part 2

    In Part 1 of this blog post, we discussed attack vectors that utilize the different features of the devices that network plugins use, such as bridge devices and tunneling devices (VXLAN in...

    Read Article
  • loading
    Loading More...