Must reads

Newsletter sign up

Get insights directly to your inbox

Subscribe to our newsletter for blog recaps, fresh tips, insights, and resource downloads.

Newsletter Example
Why automated penetration testing is essential for CTEM

Security Solutions

5 mins

Why automated penetration testing is essential for CTEM

Learn why automated penetration testing is essential for Continuous Threat Exposure Management (CTEM) to ensure proactive and scalable cybersecurity defense.

Attack Surface Management vs Vulnerability Management

Security Solutions

4 mins

Attack Surface Management vs Vulnerability Management: The Difference Explained

Explore the differences between attack surface management and vulnerability management. Learn how both enhance your cybersecurity strategy.

DevSecOps and Extreme Programming: A Security Perspective in Software Development

Security Solutions

4 mins

DevSecOps and Extreme Programming: A Security Perspective in Software Development

Explore how Extreme Programming and DevSecOps differ in integrating security into software development for safer, efficient, high-quality code delivery.

Eden
Eden - Security Operations Analyst
The Risk of Misconfigured Access Control Policies in Cloud Configuration

Threat Trends

3 mins

The Risk of Misconfigured Access Control Policies in Cloud Configuration

Learn how misconfigured cloud access controls pose security risks. Discover best practices to safeguard your cloud environment against unauthorized access.

APT Group Threat on Aviation Sector: Phases of Attack and Prevention

Threat Trends

3 mins

APT Group Threat on Aviation Sector: Phases of Attack and Prevention

Learn about the latest APT group threat targeting the aviation sector, their tactics, challenges, and proactive security measures to protect systems and passengers.

Major Cloud Misconfigurations - Publicly Accessible Storage Buckets

Threat Trends

5 mins

Major Cloud Misconfigurations - Publicly Accessible Storage Buckets

Learn how to secure cloud storage buckets and prevent misconfigurations that leave sensitive data publicly accessible. Protect your business with Hadrian's expert solutions.

Understanding Attack Surface Management: What It Is and Why It Matters

Security Solutions

5 mins

Understanding Attack Surface Management: What It Is and Why It Matters

Learn what Attack Surface Management (ASM) is, why it matters, and how it protects your digital assets by identifying and mitigating cyber threats.

DevSecOps and Lean: A Security Perspective in Software Development

Security Solutions

4 mins

DevSecOps and Lean: A Security Perspective in Software Development

Explore how DevSecOps and Lean integrate security into software development, enhancing workflow efficiency and ensuring robust security practices

Eden
Eden - Security Operations Analyst

Security Solutions

2 mins

Unleashing SanicDNS for Reconnaissance

SanicDNS delivers lightning-fast DNS resolution for network reconnaissance. 200 times faster than MassDNS, visit the SanicDNS GitHub repository

The Five Hidden Cloud Risks

Threat Trends

6 mins

The Five Hidden Cloud Risks

Discover the top hidden cloud risks, from misconfigurations to unsecured APIs, and learn how to protect your data and maintain operational integrity.

Hadrian Security: Celebrating Three Years of Unwavering Growth and Innovation

Inside Hadrian

2 mins

Hadrian Security: Celebrating Three Years of Unwavering Growth and Innovation

Join us in celebrating three years of Hadrian's growth, innovation, and customer success in cybersecurity. Discover our journey and achievements.

Rogier Fischer
Rogier Fischer - CEO

Threat Trends

4 mins

Paris 2024 Olympics: Third-Party Cyber Risks Plague Global Events

The Paris 2024 Olympics is the latest global sporting event to face rising third-party cyber risks. Third-party risk monitoring is the need of the hour.

Threat Trends

3 mins

Paris 2024 Olympics Begins with  Cybersecurity Warnings

Paris 2024 Olympics faces cyber threats as sponsors become targets. Learn about the risks, phishing scams, and proactive measures to protect the Games.

Security Solutions

4 mins

World First Reconnaissance Tool - AI Path Age Detection

Hadrian's groundbreaking AI Path Age Detection revolutionizes reconnaissance for security teams. Identify risk with ease and stay ahead of cyber threats.

The Economics Of Automated Penetration Testing

Security Solutions

5 mins

The Economics Of Automated Penetration Testing

Discover how automated penetration testing boosts ROI, enhances security, and reduces costs for businesses by adopting a proactive, automated approach.

The Thin Line Between Black Hat and White Hat Hacking

Threat Trends

5 mins

The Thin Line Between Black Hat and White Hat Hacking

Explore the fine line between black hat and white hat hacking. Understand the legal and ethical differences in techniques used by hackers in cybersecurity.

What you need to know: OpenSSH Vulnerability CVE-2024-6387

Vulnerability Alerts

2 mins

Exim-tremely Critical? Do you need to worry about CVE-2024-39929

A bug in Exim MTA (CVE-2024-39929) allows remote attackers to bypass file blocking, posing severe risks. Patch and protect your organization now.

Microsoft July 2024 Patch Tuesday update

Vulnerability Alerts

4 mins

Microsoft July 2024 Patch Tuesday update addresses four Zero-Day exploits, five critical vulnerabilities

Microsoft's July 2024 update addresses 142 security vulnerabilities, including four zero-days and five critical RCE flaws. Stay informed and secure your systems.

How real is automated penetration testing?

Security Solutions

5 mins

How real is automated penetration testing?

Explore the reality of automated penetration testing. Learn its benefits, challenges, and how it complements manual testing for robust cybersecurity.

Regulating Cyber Security In A Complex Landscape

Threat Trends

7 mins

Regulating Cyber Security In A Complex Landscape

Explore how businesses navigate a surge of national and international cybersecurity regulations to safeguard sensitive data and ensure cyber resilience.

NGNIX and Pathfinder Wordlists Release

Research

2 mins

NGINX and Pathfinder Wordlists Release

Discover our new NGINX paths wordlist and Pathfinder tool for identifying vulnerabilities and enhancing web security efforts. Contribute on GitHub!

Eden
Eden - Security Operations Analyst
What you need to know: OpenSSH Vulnerability CVE-2024-6387

Vulnerability Alerts

2 mins

What you need to know: OpenSSH RegreSSHion CVE-2024-6387

OpenSSH vulnerability CVE-2024-6387 poses a critical risk, allowing remote code execution on Linux systems. Patch and protect your organization now.

DevSecOps and Kanban: A Security Perspective in Software Development

Security Solutions

3 mins

DevSecOps and Kanban: A Security Perspective in Software Development

Explore how DevSecOps and Kanban integrate security into software development, enhancing workflow efficiency and ensuring robust security practices

Eden
Eden - Security Operations Analyst
Breaking Barriers: LGBTQ+ Inclusion in Cybersecurity

Inside Hadrian

3 mins

Breaking Barriers: LGBTQ+ Inclusion in Cybersecurity

Explore LGBTQ+ inclusion in cybersecurity, Hadrian's commitment to diversity, and how allies can support a welcoming, innovative workplace.

Eden
Eden - Security Operations Analyst
Top 10 Cybersecurity Incidents in the Financial Industry

Threat Trends

5 mins

Top 10 Cybersecurity Incidents in the Financial Industry

Discover the top 10 cybersecurity incidents in the financial industry, their impacts, and lessons on preventing future breaches.

Report

5 mins

Getting GDPR Right: A Ten-point Checklist for the New CISO

A ten-point GDPR compliance checklist for the new CISO

Threat Trends

3 mins

Being A Ciso: Getting The Basics Right

Learn the critical basics every CISO needs, including asset visibility and contextual inventory, to fortify your cybersecurity defenses effectively.

The Increasing Speed of Vulnerability Exploitation

Threat Trends

3 mins

The Increasing Speed of Vulnerability Exploitation

Discover how rapid vulnerability exploitation is evolving in 2024 and learn strategies for proactive defense against these accelerating cyber threats.

How Cyberattacks Can Still Threaten Physical Stores

Threat Trends

6 mins

How Cyberattacks Can Still Threaten Physical Stores

Learn how cyberattacks threaten physical stores and discover effective strategies to safeguard your retail business from digital threats.

DevSecOps and Scrum: A Security Perspective in Software Development

Security Solutions

2 mins

DevSecOps and Scrum: A Security Perspective in Software Development

Explore the security perspectives of Scrum and DevSecOps in software development. Understand their integration, benefits, and key differences.

Eden
Eden - Security Operations Analyst
Challenges Managing the Retail Attack Surface

Threat Trends

2 mins

Challenges Managing the Retail Attack Surface

Discover the key challenges in retail attack surface management and learn how Continuous Threat Exposure Management can safeguard your digital assets.

Prevent cloud misconfiguration to secure your organization

Security Solutions

3 mins

Configuring the Cloud at Infosecurity Europe: Safeguarding Your Business

Protect your business from cloud misconfiguration risks with Hadrian's Cloud Misconfiguration Detection Service. Learn more at Infosecurity Europe 2024.

How To Incorporate Penetration Testing into your CTEM Program

Security Solutions

6 mins

How To Incorporate Penetration Testing into your CTEM Program

Discover how to seamlessly integrate penetration testing into your Continuous Threat Exposure Management (CTEM) program for robust cybersecurity.

Top 15 attacks on retail sector: Lessons learned

Threat Trends

6 mins

Top 15 attacks on retail sector: Lessons learned

Explore the chronicle of major cyber incidents in the retail sector and glean insights to fortify your cybersecurity strategy. Learn from Hadrian's analysis.

Why EASM is essential to CTEM

Security Solutions

4 mins

Why EASM is essential to CTEM

Understand why External Attack Surface Management (EASM) and Continuous Threat Exposure Management (CTEM) are vital for bolstering cybersecurity strategies.

Web Store Security Unraveled for Retail

Threat Trends

2 mins

Web Store Security Unraveled for Retail

Explore the critical importance of data security for retail web stores. Learn proactive measures to fortify against cyber threats and ensure operational resilience.

Impact of Cyberthreats on Retail

Threat Trends

4 mins

Understanding the Impact of Cyberthreats on the Retail Industry

Explore the profound implications of cyber threats on the retail sector. Discover alarming statistics, business impacts, and notable incidents.

DevSecOps and Agile: A Security Perspective in Software Development

Security Solutions

4 mins

DevSecOps and Agile: A Security Perspective in Software Development

Explore the security perspectives of Agile and DevSecOps in software development. Understand their integration, benefits, and key differences.

Eden
Eden - Security Operations Analyst
Is Automated Penetration Testing the Future?

Security Solutions

4 mins

Is Automated Penetration Testing the Future?

Explore the rise of automated penetration testing, its benefits, challenges, and the impact of AI. Is automated pen testing the future?

RSA 2024: What CISOs Need to Know

Threat Trends

3 mins

RSA 2024: What CISOs Need to Know

Discover key cybersecurity challenges facing CISOs at RSA 2024. Insights on geopolitical tensions, AI-driven attacks, budget constraints, and DevSecOps.

Security Solutions

4 mins

The Top 5 CTEM Use Cases

How CTEM revolutionizes vulnerability management, SOC analysis, DevSecOps, penetration testing, and threat hunting for proactive defense.

Offensive cybersecurity: What is it and what tools do you need?

Security Solutions

4 mins

Offensive cybersecurity: What is it and what tools do you need?

Explore offensive cybersecurity strategies and automated tools to proactively defend against evolving cyber threats. Learn more with Hadrian's Buyer's Guide.

Is Penetration Testing Dated?

Security Solutions

3 mins

Is Penetration Testing Dated?

Explore the relevance of traditional penetration testing in modern cybersecurity. Learn why adaptive approaches like continuous threat exposure management are essential.

Critical vulnerability discovered

Vulnerability Alerts

3 mins

Critical Palo Alto Networks PAN-OS zero-day exploited

Critical zero-day vulnerability CVE-2024-3400 in Palo Alto Networks PAN-OS actively exploited. Learn about the exploit and mitigation steps.

Bug-Proofing Your Rapid Development Cycle: The Power of the Automated PenTest

Security Solutions

5 mins

Bug-Proofing Your Rapid Development Cycle: The Power of the Automated PenTest

Learn how automated penetration testing can streamline bug detection and fortify your development cycle. Boost efficiency and security with Hadrian.

DevSecOps and Waterfall: A Security Perspective in Software Development

Security Solutions

2 mins

DevSecOps and Waterfall: A Security Perspective in Software Development

Explore security aspects of DevSecOps and Waterfall methodologies in software development. Discover advantages of early integration and ongoing checks.

Eden
Eden - Security Operations Analyst
Breakdown of exploits in Q1 2024

Threat Trends

4 mins

Breakdown of exploits in Q1 2024

Discover key exploits in Q1 2024. Jenkins, Ivanti, and TeamCity vulnerabilities pose significant threats. Learn about exploit trends and prioritization.

In 2024, it’s time to create your CISO superhero

Threat Trends

5 mins

In 2024, it’s time to create your CISO superhero

Explore the changing landscape for CISOs in 2024. From salary increases to closer CEO connections, discover the future of cybersecurity leadership.

The Top Security Issues You Don't Think About

Threat Trends

15 mins

The Top Security Issues You Don't Think About

Explore overlooked security threats like file upload flaws, missing authorization, and subdomain takeovers. Learn how to mitigate these risks effectively.

Can penetration testing be automated?

Security Solutions

4 mins

Automated security testing is on the rise

Discover the growing importance of automation in cybersecurity testing, driving the shift towards comprehensive security strategies.

How NIS2 Will Impact Your Industry

Security Solutions

3 mins

How NIS2 Will Impact Your Industry

Discover how the NIS2 Directive impacts diverse industries across the EU. Learn about cybersecurity measures and sector-specific implications.

Offensive AI Strengthens your Defenses

Security Solutions

5 mins

Security is at the heart of digital transformation

Discover how to navigate security risks in digital transformation projects. Learn five key tips to integrate cybersecurity seamlessly.

The EU’s new NIS2 cybersecurity directive: Everything you need to know

Security Solutions

5 mins

The EU’s new NIS2 cybersecurity directive: Everything you need to know

Get the lowdown on the EU's NIS2 cybersecurity directive. Understand compliance requirements and strategic planning for seamless adoption. Download our eBook!

Empowering Women in Cybersecurity: An Interview with Anique Lodewijkx

Inside Hadrian

3 mins

Empowering Women in Cybersecurity: An Interview with Anique Lodewijkx

Anique Lodewijkx shares her journey, insights, and aspirations for a more inclusive future in cybersecurity. Celebrate International Women's Day with her empowering interview.

Recruiting to reduce risk: Addressing the cybersecurity skills gap

Security Solutions

5 mins

Recruiting to reduce risk: Addressing the cybersecurity skills gap

Explore strategies to address the cybersecurity skills gap. Widen talent pools, enhance company culture, and invest in training to fortify your organization's defenses.

TeamCity Authentication Bypass Vulnerabilities Addressed (CVE-2024-27198 and CVE-2024-27199)

Vulnerability Alerts

3 mins

TeamCity Authentication Bypass Vulnerabilities Addressed (CVE-2024-27198 and CVE-2024-27199)

Recent disclosures have highlighted two vulnerabilities within JetBrains TeamCity, a popular CI/CD server.

Simplifying patching and security hardening

Security Solutions

4 mins

Simplifying patching and security hardening

Potential Risks streamlines patching, reducing cyberattack risks by improving prioritization.

The GigaOm Radar Report for Attack Surface Management 2024 has been released, and Hadrian is the only vendor recognized as both a Leader and Outperformer

Security Solutions

2 mins

GigaOm Radar: Hadrian is the only vendor recognized as both a Leader and Outperformer

Hadrian emerges as a leader and outperformer in the 2024 GigaOm Attack Surface Management Radar.

Hadrian Recognized as the Only Vendor That is Both a Leader and Outperformer in GigaOm Radar Report for Attack Surface Management 2024

Press Releases

2 mins

Hadrian Recognized in GigaOm Radar Report for Attack Surface Management 2024

Hadrian is the only vendor recognized as both a Leader and Outperformer in the 2024 GigaOm Radar Report for ASM

The Development Methodologies: A Deeper Look

Security Solutions

5 mins

The Development Methodologies: A Deeper Look

Explore the nuances of development methodologies and their comparison to DevSecOps, evaluating their suitability for efficient team development.

Eden
Eden - Security Operations Analyst
Five Ways to Make Your Security Team More Efficient

Security Solutions

5 mins

Five Ways to Make Your Security Team More Efficient

Discover five strategies to optimize your cybersecurity team's performance without increasing resources. Learn to collaborate, train, automate, and invest wisely.

Why DevSecOps is the best bet for secure development

Security Solutions

5 mins

Why DevSecOps is the best bet for secure development

DevOps has revolutionized software development, as rushed and increasing number of code deployments often sacrifice security.

Data Breach: 5 Key Impacts for Luxury Brands

Threat Trends

2 mins

Data Breach: 5 Key Impacts for Luxury Brands

In the high-stakes and high-costs world of luxury brands, a data breach can mean significant damages to a brand's reputation. But what are the lesser known impacts?

Active exploitation of Ivanti Connect Secure and Policy Secure Gateways

Vulnerability Alerts

4 mins

Active exploitation of Ivanti Connect Secure and Policy Secure Gateways

Two new high-severity vulnerabilities for Ivanti Connect Secure and Policy Secure Gateways have been discovered and active exploitation is occurring.

A DORA Compliance Checklist for Financial Resilience

Security Solutions

2 mins

A DORA Compliance Checklist for Financial Resilience

Unlock financial resilience with our DORA compliance checklist. Understand, adapt, and implement strategies aligned with the Digital Operational Resilience Act for robust cybersecurity.

Exploits Published for Jenkins Automation Server

Vulnerability Alerts

2 mins

Exploits Published for Jenkins Automation Server

Two vulnerabilities to Jenkins, a widely utilized open-source automation server have recently been published and active exploitation has been reported.

How to pick an attack surface management solution?

Security Solutions

4 mins

How to pick an attack surface management solution?

Navigate the complex landscape of External Attack Surface Management (EASM). Learn key components, integration strategies, threat mitigation, vendor selection, and upcoming trends with Hadrian.

Understanding Insecure Design: A Deep Dive

Threat Trends

7 mins

Understanding Insecure Design: A Deep Dive

Dive into the world of Insecure Design in API security. Understand vulnerabilities, real-world examples, top CWEs, impacts, and effective remediation strategies with our comprehensive guide.

Does DevSecOps Make a Difference?

Security Solutions

3 mins

Does DevSecOps Make a Difference?

Explore the tangible impact of DevSecOps on cybersecurity. Learn how Hadrian pioneers this approach, saving organizations millions in potential breach costs.

Eden
Eden - Security Operations Analyst
Top Ten Security Misconfigurations

Threat Trends

5 mins

Top Ten Security Misconfigurations hackers are exploiting

Discover the most exploited security misconfigurations and fortify your defenses. Learn from NSA and CISA insights to safeguard against cyber threats.

Can penetration testing be automated?

Security Solutions

3 mins

Can penetration testing be automated?

Understand the limitations of traditional pen testing and the advantages and disadvantages of automated penetration testing tools.

Hackers’ Top 5 Cybersecurity Predictions for 2024

Threat Trends

17 mins

Hackers’ Top 5 Cybersecurity Predictions for 2024

Stay informed and prepare your cybersecurity measures for the next 12 months with Hackers’ Top 5 Cybersecurity Predictions for 2024

Melvin Lammerts
Melvin Lammerts - Hacking Manager at Hadrian
How unknown risks are causing cybersecurity strategies to evolve

Vulnerability Alerts

4 mins

How Unknown Risks Are Causing Cybersecurity Strategies to Evolve

Discover the shift from reactive to offensive cybersecurity. Learn how businesses adopt proactive strategies to identify and mitigate vulnerabilities before exploitation.

Everything you need to know: DDoS attacks on the rise

Threat Trends

4 mins

Everything you need to know: DDoS attacks on the rise

Explore the surge in DDoS attacks, their forms, and the growing sophistication. Learn how to defend against this rising threat in the cybersecurity landscape.

What is DevSecOps?

Security Solutions

2 mins

What is DevSecOps?

Discover how DevSecOps revolutionizes software development, integrating security from the start. Learn its benefits, differences from DevOps, and the importance of application security.

Mobilize fast remediation with Secure Share

Security Solutions

4 mins

Mobilize fast remediation with Secure Share

Secure Share by Hadrian simplifies and accelerates vulnerability remediation by enabling seamless collaboration between security and development teams

Insecure Direct Object Reference (IDOR) - A Deep Dive

Threat Trends

5 mins

Insecure Direct Object Reference (IDOR) - A Deep Dive

Insecure Direct Object Reference s a critical flaw allowing unauthorized data access. This guide covers exploitation methods, examples, and remediation.

The importance of building a Software Bill of Materials (SBOM)

Security Solutions

6 mins

The importance of building a Software Bill of Materials (SBOM)

Secure software requires knowing each component's security. A Software Bill of Materials (SBOM) lists them all, ensuring a systematic approach.

Top Software Weaknesses: Unmasking the Most Persistent Threats in 2023

Threat Trends

3 mins

Top Software Weaknesses: Unmasking the Most Persistent Threats in 2023

15 weaknesses consistently present from 2019-2023 according to the CWE. Despite awareness, these vulnerabilities remain challenging - learn more here.

How can the energy sector prepare for NIS2?

Security Solutions

5 mins

How can the Energy Sector prepare for NIS2 Compliance?

The NIS2 directive lists the energy sector in the “SECTORS OF HIGH CRITICALITY”, it holds profound implications - necessitating a comprehensive response.

Top Initial Access Vectors in 2023 and What to Do About Them

Threat Trends

4 mins

Top Initial Access Vectors in 2023 and What to Do About Them

Explore the threat landscape of cyberattacks targeting initial access vectors and the consequential surge in ransomware attacks globally.

High-severity vulnerability found in WP Fastest Cache WordPress plugin

Vulnerability Alerts

2 mins

High-severity vulnerability found in WP Fastest Cache WordPress plugin

WP Fastest Cache allows unauthenticated access to WordPress databases. To protect your WordPress site, update to version 1.2.2 as soon as possible.

Empowering EU Organizations: Navigating the Digital Security Landscape

Security Solutions

2 mins

Empowering EU Organizations: Navigating the Digital Security Landscape

NIS2 is introduced to promote advanced cybersecurity solutions and technology adoption for a more secure digital future.

IDOR Explained: Everything you need to know

Threat Trends

5 mins

IDOR Explained: Everything you need to know

Learn everything you need to know about Insecure Direct Object Reference (IDOR) vulnerabilities and how to mitigate them.

Why is the Digital Operational Resilience Act a game-changer?

Security Solutions

1 mins

Why is the Digital Operational Resilience Act a game-changer?

DORA, in action from Jan 16, 2023, enhances EU financial sector ICT risk standards, promoting resilience, efficiency, and compliance.

cURL and libcurl CVEs Unwrapped: Debunking the Hype

Threat Trends

4 mins

cURL and libcurl CVEs Unwrapped: Debunking the Hype

Discover the truth behind the recent hype surrounding cURL and libcurl vulnerabilities. Explore the impact and the lessons learned about responsible reporting.

Eden
Eden - Security Operations Analyst
Choosing the Right Pen Test Partner

Security Solutions

4 mins

Choosing the Right Pen Test Partner

Navigating the landscape of cybersecurity solutions is overwhelming. Learn the pros and cons about: Penetration Testing, PTaaS, and Automated Penetration Testing.

Top 10 Cyber Security Resources to Follow

Security Solutions

4 mins

Top 10 Cybersecurity Resources to Follow

In the world of cybersecurity, knowledge is power. A curated list of resources enables both seasoned professionals and beginners to stay in the loop.

New critical Citrix ADC and Gateway zero-day vulnerability

Vulnerability Alerts

3 mins

New critical Citrix ADC and Gateway zero-day vulnerability

New critical zero-day vulnerability found in Citrix ADC and Gateway allows remote exploitation by unauthenticated attackers. Immediate action recommended.

Managing your offensive security scope

Security Solutions

4 mins

Managing your offensive security scope

Hadrian's Scope Management feature revolutionizes offensive security by helping organizations identify and assess their entire attack surface.

Preparing for DORA: A Guide for Cybersecurity Experts

Security Solutions

3 mins

Preparing for DORA: A Guide for Cybersecurity Experts

DORA presents businesses in the financial sector with both a significant challenge and a tremendous opportunity, find out more in this blog.

MOVEit Breach: Timeline of the Largest Hack of 2023

Threat Trends

6 mins

MOVEit Breach: Timeline of the Largest Hack of 2023

The MOVEit data breach is fast becoming the largest in history - despite timely updates Clop's ransomware spree continues. Read the timeline of attacks here.

Thinking Like a Hacker: The Foundation of Cyber Resiliency

Threat Trends

4 mins

Thinking Like a Hacker: The Foundation of Cyber Resiliency

Learn how to enhance cyber resiliency by thinking like a hacker. Use the hacker perspective to strengthen defenses against cyber threats.

Revolutionizing offensive security with Generative AI

Security Solutions

2 mins

Revolutionizing offensive security with Generative AI

Hadrian introduces Vibia AI, a Generative AI assistant for offensive security.

Bracing for 2024: Cyber threats for modern manufacturers

Threat Trends

3 mins

Bracing for 2024: Cyber threats for modern manufacturers

Manufacturing is undergoing a rapid digital transformation, bringing both benefits and new cybersecurity risks.

2022's Top Routinely Exploited Vulnerabilities Revealed in New Cybersecurity Advisory

Threat Trends

4 mins

2022's Top Routinely Exploited Vulnerabilities Revealed in New Cybersecurity Advisory

2022's frequently exploited vulnerabilities revealed in joint advisory by CISA, NSA, FBI, and partners. 2022 saw continued exploitation of old vulnerabilities.

Smart manufacturing: AI's impact and the security imperative

Threat Trends

3 mins

Smart manufacturing: AI's impact and the security imperative

AI transforms manufacturing through OT-IoT integration, but also brings cyber threats; strong digital defenses are essential.

What is automated penetration testing?

Security Solutions

4 mins

What is automated penetration testing?

One area where automation is underutilized is penetration testing which is aimed at identifying vulnerabilities in an organization's assets through simulated attacks.

How to prepare for NIS2

Security Solutions

6 mins

How to prepare for NIS2

Enhance your cybersecurity, comply with NIS2 requirements, and avoid costly penalties.

How Generative AI is Shaping Cybercrime

Threat Trends

5 mins

How Generative AI is Shaping Cybercrime

Generative AI is not merely transforming our work processes; it is also exerting a profound impact on the global threat landscape.

Klaas
Klaas - AI Lead