Threat Research​

  • Interview: Embracing a Unified Identity-Centered Zero Trust Approach12:45

    Interview: Embracing a Unified Identity-Centered Zero Trust Approach

    Watch this video interview with Amit Chhikara, principal in Deloitte Advisory's cyber risk and privileged access management practices, and Clay Rogers, vice president, global strategic alliances

    Watch Video
  • CyberArk Named a Leader in the 2023 Gartner® Magic Quadrant™ for Privileged Access Management – again.

    View the Report
  • Operation Grandma: A Tale of LLM Chatbot Vulnerability

    Operation Grandma: A Tale of LLM Chatbot Vulnerability

    Who doesn’t like a good bedtime story from Grandma? In today’s landscape, more and more organizations are turning to intelligent chatbots or large language models (LLMs) to boost service quality...

    Read Article
  • CyberArk 2024 Identity Security Threat Landscape EMEA Report

    CyberArk 2024 Identity Security Threat Landscape EMEA Report

    CyberArk 2024 Identity Security Threat Landscape EMEA Report provides detailed insights on identity-related cybersecurity threats and technology trends.

    Read More
  • Tales from the Trenches: A Fireside Chat with CyberArk's Incident Response & Red Teams47:21

    Tales from the Trenches: A Fireside Chat with CyberArk's Incident Response & Red Teams

    Attackers are increasingly successful in gaining access to systems. How prepared are you to defend against the latest attack methods?

    Watch Video
  • The Hacker’s Guide to The Cosmos (SDK): Stealing Millions from the Blockchain

    The Hacker’s Guide to The Cosmos (SDK): Stealing Millions from the Blockchain

    Introduction Welcome, fellow travelers of the Cosmos! While we may not be traversing the stars on a spaceship, we are all interconnected through the powerful network of blockchains. Unfortunately,...

    Read Article
  • A Deep Dive into Penetration Testing of macOS Applications (Part 3)

    A Deep Dive into Penetration Testing of macOS Applications (Part 3)

    Introduction This is the final installment of the blog series “A Deep Dive into Penetration Testing of macOS Applications.” Previously, we discussed the structure of macOS applications and their...

    Read Article
  • APT29’s Attack on Microsoft: Tracking Cozy Bear’s Footprints

    APT29’s Attack on Microsoft: Tracking Cozy Bear’s Footprints

    A new and concerning chapter has unfolded in these troubled times of geopolitical chaos. The Cozy Bear threat actor has caused significant breaches targeting Microsoft and HPE, and more are likely...

    Read Article
  • Ransomware’s PLAYing a Broken Game

    Ransomware’s PLAYing a Broken Game

    Abstract The Play ransomware group is one of the most successful ransomware syndicates today. All it takes is a quick peek with a disassembler to know why this group has become infamous. This is...

    Read Article
  • CyberArk Labs’ 2023 Threat Research Highlights

    CyberArk Labs’ 2023 Threat Research Highlights

    Throughout an eventful 2023, CyberArk Labs remained focused on uncovering emerging cyberattack patterns and producing threat research aimed at helping organizations strengthen their identity...

    Read Article
  • SafeNet: Securing Your Network From Yourself

    SafeNet: Securing Your Network From Yourself

    TL;DR Whether working at home or in the office, when conducting cybersecurity research, investigating the dark web forums or engaging with any dangerous part of the internet, staying safe is...

    Read Article
  • Identity and Access Management is Leading the Way for Identity Security

    Identity and Access Management is Leading the Way for Identity Security

    This ESG eBook details how identity & access management has evolved in recent years and what you can do to bolster your identity security.

    Read More
  • Okta Breach Update - More Widespread than Originally Disclosed13:12

    Okta Breach Update - More Widespread than Originally Disclosed

    CyberArk expert Andy Thompson analyzes the latest updates on Okta’s October 2023 breach (customer support system) with an emphasis on best practices.

    Watch Video
  • Fuzzer-V

    Fuzzer-V

    TL;DR An overview of a fuzzing project targeting the Hyper-V VSPs using Intel Processor Trace (IPT) for code coverage guided fuzzing, built upon WinAFL, winipt, HAFL1, and Microsoft’s IPT.sys....

    Read Article
  • Assessing the Attack on Okta’s Support Unit Mitigate Your Risk with Six Steps and New CyberArk HAR Tool28:07

    Assessing the Attack on Okta’s Support Unit Mitigate Your Risk with Six Steps and New CyberArk HAR Tool

    CyberArk's Khizar Sultan and Andy Thompson deconstruct the Okta breach and share strategies you can take to mitigate the risks of identity attacks.

    Watch Video
  • Anatomy of the MGM Hack: A CyberArk Labs Perspective46:01

    Anatomy of the MGM Hack: A CyberArk Labs Perspective

    CyberArk's resident experts, Khizar Sultan and Andy Thompson, examine the root causes and lessons learned from the MGM Resorts attack.

    Watch Video
  • The MGM Resorts Attack: Initial Analysis

    The MGM Resorts Attack: Initial Analysis

    The recent cyberattack on MGM Resorts International has raised serious concerns about the security of sensitive data and the vulnerabilities organizations face in today’s digital landscape. In...

    Read Article
  • NVMe: New Vulnerabilities Made Easy

    NVMe: New Vulnerabilities Made Easy

    As vulnerability researchers, our primary mission is to find as many vulnerabilities as possible with the highest severity as possible. Finding vulnerabilities is usually challenging. But could...

    Read Article
  • Fantastic Rootkits: And Where To Find Them (Part 3) – ARM Edition

    Fantastic Rootkits: And Where To Find Them (Part 3) – ARM Edition

    Introduction In this blog, we will discuss innovative rootkit techniques on a non-traditional architecture, Windows 11 on ARM64. In the prior posts, we covered rootkit techniques applied to a...

    Read Article
  • A Deep Dive into Penetration Testing of macOS Applications (Part 2)

    A Deep Dive into Penetration Testing of macOS Applications (Part 2)

    Introduction This is the second part of the “A Deep Dive into Penetration Testing of macOS Application” blog series. In the first part, we learned about macOS applications and their structure and...

    Read Article
  • A Deep Dive into Penetration Testing of macOS Applications (Part 1)

    A Deep Dive into Penetration Testing of macOS Applications (Part 1)

    Introduction As many of us know, there are a lot of guides and information on penetration testing applications on Windows and Linux. Unfortunately, a step-by-step guide doesn’t exist in the macOS...

    Read Article
  • loading
    Loading More...