In an era where cyber threats are evolving at an unprecedented pace, understanding the tactics and techniques used by attackers is crucial for effective defense. This webinar, presented by CyberArk Labs, delves into some of the most significant breaches of the year, offering an in-depth analysis of the methodologies employed by cyber adversaries. We will explore how these attacks were orchestrated, identifying the common threads and unique strategies that made them successful. Join us to gain a clearer understanding of the current threat landscape.
Recommended for You

Cryptojacking malware—a type of malware that tries to steal cryptocurrencies from users on infected machines. Curiously, this kind of malware isn’t nearly as famous as ransomware or even...

Introduction Identity providers (IdPs) or Identity and Access Management (IAM) solutions are essential for implementing secure and efficient user authentication and authorization in every...

You might not recognize the term “OAuth,” otherwise known as Open Authorization, but chances are you’ve used it without even realizing it. Every time you log into an app or website using Google,...

Watch this CyberArk Labs webinar for an in-depth analysis of the Dec. 2024 U.S. Treasury cyberattack, its causes and mitigation strategies.

The increasing complexity of generative AI-driven cyberthreats demands a more diligent approach to how organizations detect and respond to these dangers

The year 2025 started with a bang, with these cybersecurity stories making headlines in the first few days: New details emerged on a “major” identity-related security incident involving the U.S....

Learn about recent hacks, emerging attack methods, newly identified threats and essential mitigation strategies.

Explore an IDC InfoBrief sponsored by CyberArk, revealing the challenges and trends in identity security across industries. Understand the risks and solutions for managing human and machine identities

While Kubernetes’ Role-based access control (RBAC) authorization model is an essential part of securing Kubernetes, managing it has proven to be a significant challenge — especially when dealing...

TL;DR ByteCodeLLM is a new open-source tool that harnesses the power of Local Large Language Models (LLMs) to decompile Python executables. Furthermore, and importantly, it prioritizes data...

Generated using Ideogram Abstract Privacy is a core aspect of our lives. We have the fundamental right to control our personal data, physically or virtually. However, as we use products from...

Recently, we researched a project on Portainer, the go-to open-source tool for managing Kubernetes and Docker environments. With more than 30K stars on GitHub, Portainer gives you a user-friendly...

As large language models (LLMs) become more advanced and are granted additional capabilities by developers, security risks increase dramatically. Manipulated LLMs are no longer just a risk of...

CyberArk’s CIO shares his perspective on AI trends, threats, CyberArk’s approach to adoption and best practices for risk reduction.

In software development, CI/CD practices are now standard, helping to move code quickly and efficiently from development to production. Azure DevOps, previously known as Team Foundation Server...

In this paper, ESG Analysts describe how midsize organizations, with limited resources, can gain a competitive advantage when strong identity security is in place.

See how Intelligent Privilege Controls™ are dynamically applied to protect a user’s access when it becomes high-risk.

tl;dr: Large language models (LLMs) are highly susceptible to manipulation, and, as such, they must be treated as potential attackers in the system. LLMs have become extremely popular and serve...

Over the short span of video game cheating, both cheaters and game developers have evolved in many ways; this includes everything from modification of important game variables (like health) by...

Following our post “A Brief History of Game Cheating,” it’s safe to say that cheats, no matter how lucrative or premium they might look, always carry a degree of danger. Today’s story revolves...