Must reads

Newsletter sign up

Get insights directly to your inbox

Subscribe to our newsletter for blog recaps, fresh tips, insights, and resource downloads.

Newsletter Example
Understanding DNS Misconfigurations: A Major Cybersecurity Threat

Research | 2 mins

Understanding DNS Misconfigurations: A Major Cybersecurity Threat
Recognizing the Value of Ongoing Cyber Risk Surveillance

Research | 3 mins

Recognizing the Value of Ongoing Cyber Risk Surveillance
Overcoming Security Challenges with Automated Vulnerability Validation

Research | 3 mins

Overcoming Security Challenges with Automated Vulnerability Validation
Injection Attacks, DNS Vulnerabilities, and Information Leaks Among Top Cyber Risks in 2024

Press Releases | 2 mins

Injection Attacks, DNS Vulnerabilities, and Information Leaks Among Top Cyber Risks in 2024
Robin Bell, CISO of Egress, sharing insights on security posture and business strategy

Research | 8 mins

CISO Conversations: Robin Bell of Egress on CISO's Role in M&As
Six Key Risks in Attack Surface Management for Critical Infrastructure

Threat Trends | 5 mins

Six Key Risks in Attack Surface Management for Critical Infrastructure
How Financial Institutions Can Stay Ahead of Supply Chain Attacks

Research | 5 mins

How Financial Institutions Can Stay Ahead of Supply Chain Attacks
CISO Conversations Vaibhav Patkar

Research | 5 mins

CISO Conversations: Veteran Vaibhav Patkar Bats for Mind over Matter
How Third-Party Vendors Increase Financial Institutions' Risks

Research | 3 mins

How Third-Party Vendors Increase Financial Institutions' Risks
Microsoft Patch Tuesday October 2024

Vulnerability Alerts | 5 mins

Microsoft Patch Tuesday October 2024: Five zero-days, 118 vulnerabilities fixed
World Aviation Festival 2024: Seven crucial factors in aviation cybersecurity

Security Solutions | 4 mins

World Aviation Festival 2024: Seven crucial factors in aviation cybersecurity
Everything CISOs need to know about NIS2

Security Solutions | 5 mins

Everything CISOs need to know about NIS2
CISO Conversations: ICT Group's Kelvin Rorive Says Absolute Security an Illusion

Research | 3 mins

CISO Conversations: ICT Group's Kelvin Rorive Says Absolute Security an Illusion

Research | 4 mins

Can LLMs improve subdomain enumeration?
Aviation sector cybersecurity: A primer for sector CISOs

Security Solutions | 5 mins

Aviation sector cybersecurity: A primer for sector CISOs
How CISOs can prepare for starting at a new company

Threat Trends | 5 mins

How CISOs can prepare for starting at a new company
Microsoft Patch Tuesday September 2024: Four Zero Days and More Patched

Vulnerability Alerts | 5 mins

Microsoft Patch Tuesday September 2024: Four Zero Days and More Patched
M&A and cybersecurity: A case study in aviation industry

Threat Trends | 4 mins

M&A and cybersecurity: A case study in aviation industry
Why automated penetration testing is essential for CTEM

Security Solutions | 5 mins

Why automated penetration testing is essential for CTEM
Attack Surface Management vs Vulnerability Management

Security Solutions | 4 mins

Attack Surface Management vs Vulnerability Management: The Difference Explained
The Risk of Misconfigured Access Control Policies in Cloud Configuration

Threat Trends | 3 mins

The Risk of Misconfigured Access Control Policies in Cloud Configuration
APT Group Threat on Aviation Sector: Phases of Attack and Prevention

Threat Trends | 3 mins

APT Group Threat on Aviation Sector: Phases of Attack and Prevention
Major Cloud Misconfigurations - Publicly Accessible Storage Buckets

Threat Trends | 5 mins

Major Cloud Misconfigurations - Publicly Accessible Storage Buckets
Understanding Attack Surface Management: What It Is and Why It Matters

Security Solutions | 5 mins

Understanding Attack Surface Management: What It Is and Why It Matters

Security Solutions | 2 mins

Unleashing SanicDNS for Reconnaissance
The Five Hidden Cloud Risks

Threat Trends | 6 mins

The Five Hidden Cloud Risks

Threat Trends | 4 mins

Paris 2024 Olympics: Third-Party Cyber Risks Plague Global Events

Threat Trends | 3 mins

Paris 2024 Olympics Begins with  Cybersecurity Warnings

Security Solutions | 4 mins

World First Reconnaissance Tool - AI Path Age Detection
The Economics Of Automated Penetration Testing

Security Solutions | 5 mins

The Economics Of Automated Penetration Testing
The Thin Line Between Black Hat and White Hat Hacking

Threat Trends | 5 mins

The Thin Line Between Black Hat and White Hat Hacking
What you need to know: OpenSSH Vulnerability CVE-2024-6387

Vulnerability Alerts | 2 mins

Exim-tremely Critical? Do you need to worry about CVE-2024-39929
Microsoft July 2024 Patch Tuesday update

Vulnerability Alerts | 4 mins

Microsoft July 2024 Patch Tuesday update addresses four Zero-Day exploits, five critical vulnerabilities
How real is automated penetration testing?

Security Solutions | 5 mins

How real is automated penetration testing?
Regulating Cyber Security In A Complex Landscape

Threat Trends | 7 mins

Regulating Cyber Security In A Complex Landscape
What you need to know: OpenSSH Vulnerability CVE-2024-6387

Vulnerability Alerts | 2 mins

What you need to know: OpenSSH RegreSSHion CVE-2024-6387
Top 10 Cybersecurity Incidents in the Financial Industry

Threat Trends | 5 mins

Top 10 Cybersecurity Incidents in the Financial Industry

Report | 5 mins

Getting GDPR Right: A Ten-point Checklist for the New CISO

Threat Trends | 3 mins

Being A Ciso: Getting The Basics Right
The Increasing Speed of Vulnerability Exploitation

Threat Trends | 3 mins

The Increasing Speed of Vulnerability Exploitation
How Cyberattacks Can Still Threaten Physical Stores

Threat Trends | 6 mins

How Cyberattacks Can Still Threaten Physical Stores
Challenges Managing the Retail Attack Surface

Threat Trends | 2 mins

Challenges Managing the Retail Attack Surface
Prevent cloud misconfiguration to secure your organization

Security Solutions | 3 mins

Configuring the Cloud at Infosecurity Europe: Safeguarding Your Business
How To Incorporate Penetration Testing into your CTEM Program

Security Solutions | 6 mins

How To Incorporate Penetration Testing into your CTEM Program
Top 15 attacks on retail sector: Lessons learned

Threat Trends | 6 mins

Top 15 attacks on retail sector: Lessons learned
Why EASM is essential to CTEM

Security Solutions | 4 mins

Why EASM is essential to CTEM
Web Store Security Unraveled for Retail

Threat Trends | 2 mins

Web Store Security Unraveled for Retail
Impact of Cyberthreats on Retail

Threat Trends | 4 mins

Understanding the Impact of Cyberthreats on the Retail Industry
Is Automated Penetration Testing the Future?

Security Solutions | 4 mins

Is Automated Penetration Testing the Future?
RSA 2024: What CISOs Need to Know

Threat Trends | 3 mins

RSA 2024: What CISOs Need to Know

Security Solutions | 4 mins

The Top 5 CTEM Use Cases
Offensive cybersecurity: What is it and what tools do you need?

Security Solutions | 4 mins

Offensive cybersecurity: What is it and what tools do you need?
Is Penetration Testing Dated?

Security Solutions | 3 mins

Is Penetration Testing Dated?
Critical vulnerability discovered

Vulnerability Alerts | 3 mins

Critical Palo Alto Networks PAN-OS zero-day exploited
Bug-Proofing Your Rapid Development Cycle: The Power of the Automated PenTest

Security Solutions | 5 mins

Bug-Proofing Your Rapid Development Cycle: The Power of the Automated PenTest
Breakdown of exploits in Q1 2024

Threat Trends | 4 mins

Breakdown of exploits in Q1 2024
In 2024, it’s time to create your CISO superhero

Threat Trends | 5 mins

In 2024, it’s time to create your CISO superhero
The Top Security Issues You Don't Think About

Threat Trends | 15 mins

The Top Security Issues You Don't Think About
Can penetration testing be automated?

Security Solutions | 4 mins

Automated security testing is on the rise
How NIS2 Will Impact Your Industry

Security Solutions | 3 mins

How NIS2 Will Impact Your Industry
Offensive AI Strengthens your Defenses

Security Solutions | 5 mins

Security is at the heart of digital transformation
The EU’s new NIS2 cybersecurity directive: Everything you need to know

Security Solutions | 5 mins

The EU’s new NIS2 cybersecurity directive: Everything you need to know
Empowering Women in Cybersecurity: An Interview with Anique Lodewijkx

Inside Hadrian | 3 mins

Empowering Women in Cybersecurity: An Interview with Anique Lodewijkx
Recruiting to reduce risk: Addressing the cybersecurity skills gap

Security Solutions | 5 mins

Recruiting to reduce risk: Addressing the cybersecurity skills gap
TeamCity Authentication Bypass Vulnerabilities Addressed (CVE-2024-27198 and CVE-2024-27199)

Vulnerability Alerts | 3 mins

TeamCity Authentication Bypass Vulnerabilities Addressed (CVE-2024-27198 and CVE-2024-27199)
Simplifying patching and security hardening

Security Solutions | 4 mins

Simplifying patching and security hardening
The GigaOm Radar Report for Attack Surface Management 2024 has been released, and Hadrian is the only vendor recognized as both a Leader and Outperformer

Security Solutions | 2 mins

GigaOm Radar: Hadrian is the only vendor recognized as both a Leader and Outperformer
Hadrian Recognized as the Only Vendor That is Both a Leader and Outperformer in GigaOm Radar Report for Attack Surface Management 2024

Press Releases | 2 mins

Hadrian Recognized in GigaOm Radar Report for Attack Surface Management 2024
Five Ways to Make Your Security Team More Efficient

Security Solutions | 5 mins

Five Ways to Make Your Security Team More Efficient
Why DevSecOps is the best bet for secure development

Security Solutions | 5 mins

Why DevSecOps is the best bet for secure development
Data Breach: 5 Key Impacts for Luxury Brands

Threat Trends | 2 mins

Data Breach: 5 Key Impacts for Luxury Brands
Active exploitation of Ivanti Connect Secure and Policy Secure Gateways

Vulnerability Alerts | 4 mins

Active exploitation of Ivanti Connect Secure and Policy Secure Gateways
A DORA Compliance Checklist for Financial Resilience

Security Solutions | 2 mins

A DORA Compliance Checklist for Financial Resilience
Exploits Published for Jenkins Automation Server

Vulnerability Alerts | 2 mins

Exploits Published for Jenkins Automation Server
How to pick an attack surface management solution?

Security Solutions | 4 mins

How to pick an attack surface management solution?
Understanding Insecure Design: A Deep Dive

Threat Trends | 7 mins

Understanding Insecure Design: A Deep Dive
Top Ten Security Misconfigurations

Threat Trends | 5 mins

Top Ten Security Misconfigurations hackers are exploiting
Can penetration testing be automated?

Security Solutions | 3 mins

Can penetration testing be automated?
How unknown risks are causing cybersecurity strategies to evolve

Vulnerability Alerts | 4 mins

How Unknown Risks Are Causing Cybersecurity Strategies to Evolve
Everything you need to know: DDoS attacks on the rise

Threat Trends | 4 mins

Everything you need to know: DDoS attacks on the rise
What is DevSecOps?

Security Solutions | 2 mins

What is DevSecOps?
Mobilize fast remediation with Secure Share

Security Solutions | 4 mins

Mobilize fast remediation with Secure Share
Insecure Direct Object Reference (IDOR) - A Deep Dive

Threat Trends | 5 mins

Insecure Direct Object Reference (IDOR) - A Deep Dive
The importance of building a Software Bill of Materials (SBOM)

Security Solutions | 6 mins

The importance of building a Software Bill of Materials (SBOM)
Top Software Weaknesses: Unmasking the Most Persistent Threats in 2023

Threat Trends | 3 mins

Top Software Weaknesses: Unmasking the Most Persistent Threats in 2023
How can the energy sector prepare for NIS2?

Security Solutions | 5 mins

How can the Energy Sector prepare for NIS2 Compliance?
Top Initial Access Vectors in 2023 and What to Do About Them

Threat Trends | 4 mins

Top Initial Access Vectors in 2023 and What to Do About Them
High-severity vulnerability found in WP Fastest Cache WordPress plugin

Vulnerability Alerts | 2 mins

High-severity vulnerability found in WP Fastest Cache WordPress plugin
Empowering EU Organizations: Navigating the Digital Security Landscape

Security Solutions | 2 mins

Empowering EU Organizations: Navigating the Digital Security Landscape
IDOR Explained: Everything you need to know

Threat Trends | 5 mins

IDOR Explained: Everything you need to know
Why is the Digital Operational Resilience Act a game-changer?

Security Solutions | 1 mins

Why is the Digital Operational Resilience Act a game-changer?
Choosing the Right Pen Test Partner

Security Solutions | 4 mins

Choosing the Right Pen Test Partner
Top 10 Cyber Security Resources to Follow

Security Solutions | 4 mins

Top 10 Cybersecurity Resources to Follow
New critical Citrix ADC and Gateway zero-day vulnerability

Vulnerability Alerts | 3 mins

New critical Citrix ADC and Gateway zero-day vulnerability
Managing your offensive security scope

Security Solutions | 4 mins

Managing your offensive security scope
Preparing for DORA: A Guide for Cybersecurity Experts

Security Solutions | 3 mins

Preparing for DORA: A Guide for Cybersecurity Experts
MOVEit Breach: Timeline of the Largest Hack of 2023

Threat Trends | 6 mins

MOVEit Breach: Timeline of the Largest Hack of 2023
Thinking Like a Hacker: The Foundation of Cyber Resiliency

Threat Trends | 4 mins

Thinking Like a Hacker: The Foundation of Cyber Resiliency
Revolutionizing offensive security with Generative AI

Security Solutions | 2 mins

Revolutionizing offensive security with Generative AI
Bracing for 2024: Cyber threats for modern manufacturers

Threat Trends | 3 mins

Bracing for 2024: Cyber threats for modern manufacturers