Must reads

Newsletter sign up

Get insights directly to your inbox

Subscribe to our newsletter for blog recaps, fresh tips, insights, and resource downloads.

Newsletter Example
How Financial Institutions Can Stay Ahead of Supply Chain Attacks

Research | 5 mins

How Financial Institutions Can Stay Ahead of Supply Chain Attacks
CISO Conversations Vaibhav Patkar

Research | 5 mins

CISO Conversations: Veteran Vaibhav Patkar Bats for Mind over Matter
How Third-Party Vendors Increase Financial Institutions' Risks

Research | 3 mins

How Third-Party Vendors Increase Financial Institutions' Risks
Microsoft Patch Tuesday October 2024

Vulnerability Alerts | 5 mins

Microsoft Patch Tuesday October 2024: Five zero-days, 118 vulnerabilities fixed
World Aviation Festival 2024: Seven crucial factors in aviation cybersecurity

Security Solutions | 4 mins

World Aviation Festival 2024: Seven crucial factors in aviation cybersecurity
Everything CISOs need to know about NIS2

Security Solutions | 5 mins

Everything CISOs need to know about NIS2
CISO Conversations: ICT Group's Kelvin Rorive Says Absolute Security an Illusion

Research | 3 mins

CISO Conversations: ICT Group's Kelvin Rorive Says Absolute Security an Illusion

Research | 4 mins

Can LLMs improve subdomain enumeration?
Aviation sector cybersecurity: A primer for sector CISOs

Security Solutions | 5 mins

Aviation sector cybersecurity: A primer for sector CISOs
How CISOs can prepare for starting at a new company

Threat Trends | 5 mins

How CISOs can prepare for starting at a new company
Microsoft Patch Tuesday September 2024: Four Zero Days and More Patched

Vulnerability Alerts | 5 mins

Microsoft Patch Tuesday September 2024: Four Zero Days and More Patched
M&A and cybersecurity: A case study in aviation industry

Threat Trends | 4 mins

M&A and cybersecurity: A case study in aviation industry
Why automated penetration testing is essential for CTEM

Security Solutions | 5 mins

Why automated penetration testing is essential for CTEM
Attack Surface Management vs Vulnerability Management

Security Solutions | 4 mins

Attack Surface Management vs Vulnerability Management: The Difference Explained
The Risk of Misconfigured Access Control Policies in Cloud Configuration

Threat Trends | 3 mins

The Risk of Misconfigured Access Control Policies in Cloud Configuration
APT Group Threat on Aviation Sector: Phases of Attack and Prevention

Threat Trends | 3 mins

APT Group Threat on Aviation Sector: Phases of Attack and Prevention
Major Cloud Misconfigurations - Publicly Accessible Storage Buckets

Threat Trends | 5 mins

Major Cloud Misconfigurations - Publicly Accessible Storage Buckets
Understanding Attack Surface Management: What It Is and Why It Matters

Security Solutions | 5 mins

Understanding Attack Surface Management: What It Is and Why It Matters

Security Solutions | 2 mins

Unleashing SanicDNS for Reconnaissance
The Five Hidden Cloud Risks

Threat Trends | 6 mins

The Five Hidden Cloud Risks

Threat Trends | 4 mins

Paris 2024 Olympics: Third-Party Cyber Risks Plague Global Events

Threat Trends | 3 mins

Paris 2024 Olympics Begins with  Cybersecurity Warnings

Security Solutions | 4 mins

World First Reconnaissance Tool - AI Path Age Detection
The Economics Of Automated Penetration Testing

Security Solutions | 5 mins

The Economics Of Automated Penetration Testing
The Thin Line Between Black Hat and White Hat Hacking

Threat Trends | 5 mins

The Thin Line Between Black Hat and White Hat Hacking
What you need to know: OpenSSH Vulnerability CVE-2024-6387

Vulnerability Alerts | 2 mins

Exim-tremely Critical? Do you need to worry about CVE-2024-39929
Microsoft July 2024 Patch Tuesday update

Vulnerability Alerts | 4 mins

Microsoft July 2024 Patch Tuesday update addresses four Zero-Day exploits, five critical vulnerabilities
How real is automated penetration testing?

Security Solutions | 5 mins

How real is automated penetration testing?
Regulating Cyber Security In A Complex Landscape

Threat Trends | 7 mins

Regulating Cyber Security In A Complex Landscape
What you need to know: OpenSSH Vulnerability CVE-2024-6387

Vulnerability Alerts | 2 mins

What you need to know: OpenSSH RegreSSHion CVE-2024-6387
Top 10 Cybersecurity Incidents in the Financial Industry

Threat Trends | 5 mins

Top 10 Cybersecurity Incidents in the Financial Industry

Report | 5 mins

Getting GDPR Right: A Ten-point Checklist for the New CISO

Threat Trends | 3 mins

Being A Ciso: Getting The Basics Right
The Increasing Speed of Vulnerability Exploitation

Threat Trends | 3 mins

The Increasing Speed of Vulnerability Exploitation
How Cyberattacks Can Still Threaten Physical Stores

Threat Trends | 6 mins

How Cyberattacks Can Still Threaten Physical Stores
Challenges Managing the Retail Attack Surface

Threat Trends | 2 mins

Challenges Managing the Retail Attack Surface
Prevent cloud misconfiguration to secure your organization

Security Solutions | 3 mins

Configuring the Cloud at Infosecurity Europe: Safeguarding Your Business
How To Incorporate Penetration Testing into your CTEM Program

Security Solutions | 6 mins

How To Incorporate Penetration Testing into your CTEM Program
Top 15 attacks on retail sector: Lessons learned

Threat Trends | 6 mins

Top 15 attacks on retail sector: Lessons learned
Why EASM is essential to CTEM

Security Solutions | 4 mins

Why EASM is essential to CTEM
Web Store Security Unraveled for Retail

Threat Trends | 2 mins

Web Store Security Unraveled for Retail
Impact of Cyberthreats on Retail

Threat Trends | 4 mins

Understanding the Impact of Cyberthreats on the Retail Industry
Is Automated Penetration Testing the Future?

Security Solutions | 4 mins

Is Automated Penetration Testing the Future?
RSA 2024: What CISOs Need to Know

Threat Trends | 3 mins

RSA 2024: What CISOs Need to Know

Security Solutions | 4 mins

The Top 5 CTEM Use Cases
Offensive cybersecurity: What is it and what tools do you need?

Security Solutions | 4 mins

Offensive cybersecurity: What is it and what tools do you need?
Is Penetration Testing Dated?

Security Solutions | 3 mins

Is Penetration Testing Dated?
Critical vulnerability discovered

Vulnerability Alerts | 3 mins

Critical Palo Alto Networks PAN-OS zero-day exploited
Bug-Proofing Your Rapid Development Cycle: The Power of the Automated PenTest

Security Solutions | 5 mins

Bug-Proofing Your Rapid Development Cycle: The Power of the Automated PenTest
Breakdown of exploits in Q1 2024

Threat Trends | 4 mins

Breakdown of exploits in Q1 2024
In 2024, it’s time to create your CISO superhero

Threat Trends | 5 mins

In 2024, it’s time to create your CISO superhero
The Top Security Issues You Don't Think About

Threat Trends | 15 mins

The Top Security Issues You Don't Think About
Can penetration testing be automated?

Security Solutions | 4 mins

Automated security testing is on the rise
How NIS2 Will Impact Your Industry

Security Solutions | 3 mins

How NIS2 Will Impact Your Industry
Offensive AI Strengthens your Defenses

Security Solutions | 5 mins

Security is at the heart of digital transformation
The EU’s new NIS2 cybersecurity directive: Everything you need to know

Security Solutions | 5 mins

The EU’s new NIS2 cybersecurity directive: Everything you need to know
Empowering Women in Cybersecurity: An Interview with Anique Lodewijkx

Inside Hadrian | 3 mins

Empowering Women in Cybersecurity: An Interview with Anique Lodewijkx
Recruiting to reduce risk: Addressing the cybersecurity skills gap

Security Solutions | 5 mins

Recruiting to reduce risk: Addressing the cybersecurity skills gap
TeamCity Authentication Bypass Vulnerabilities Addressed (CVE-2024-27198 and CVE-2024-27199)

Vulnerability Alerts | 3 mins

TeamCity Authentication Bypass Vulnerabilities Addressed (CVE-2024-27198 and CVE-2024-27199)
Simplifying patching and security hardening

Security Solutions | 4 mins

Simplifying patching and security hardening
The GigaOm Radar Report for Attack Surface Management 2024 has been released, and Hadrian is the only vendor recognized as both a Leader and Outperformer

Security Solutions | 2 mins

GigaOm Radar: Hadrian is the only vendor recognized as both a Leader and Outperformer
Hadrian Recognized as the Only Vendor That is Both a Leader and Outperformer in GigaOm Radar Report for Attack Surface Management 2024

Press Releases | 2 mins

Hadrian Recognized in GigaOm Radar Report for Attack Surface Management 2024
Five Ways to Make Your Security Team More Efficient

Security Solutions | 5 mins

Five Ways to Make Your Security Team More Efficient
Why DevSecOps is the best bet for secure development

Security Solutions | 5 mins

Why DevSecOps is the best bet for secure development
Data Breach: 5 Key Impacts for Luxury Brands

Threat Trends | 2 mins

Data Breach: 5 Key Impacts for Luxury Brands
Active exploitation of Ivanti Connect Secure and Policy Secure Gateways

Vulnerability Alerts | 4 mins

Active exploitation of Ivanti Connect Secure and Policy Secure Gateways
A DORA Compliance Checklist for Financial Resilience

Security Solutions | 2 mins

A DORA Compliance Checklist for Financial Resilience
Exploits Published for Jenkins Automation Server

Vulnerability Alerts | 2 mins

Exploits Published for Jenkins Automation Server
How to pick an attack surface management solution?

Security Solutions | 4 mins

How to pick an attack surface management solution?
Understanding Insecure Design: A Deep Dive

Threat Trends | 7 mins

Understanding Insecure Design: A Deep Dive
Top Ten Security Misconfigurations

Threat Trends | 5 mins

Top Ten Security Misconfigurations hackers are exploiting
Can penetration testing be automated?

Security Solutions | 3 mins

Can penetration testing be automated?
How unknown risks are causing cybersecurity strategies to evolve

Vulnerability Alerts | 4 mins

How Unknown Risks Are Causing Cybersecurity Strategies to Evolve
Everything you need to know: DDoS attacks on the rise

Threat Trends | 4 mins

Everything you need to know: DDoS attacks on the rise
What is DevSecOps?

Security Solutions | 2 mins

What is DevSecOps?
Mobilize fast remediation with Secure Share

Security Solutions | 4 mins

Mobilize fast remediation with Secure Share
Insecure Direct Object Reference (IDOR) - A Deep Dive

Threat Trends | 5 mins

Insecure Direct Object Reference (IDOR) - A Deep Dive
The importance of building a Software Bill of Materials (SBOM)

Security Solutions | 6 mins

The importance of building a Software Bill of Materials (SBOM)
Top Software Weaknesses: Unmasking the Most Persistent Threats in 2023

Threat Trends | 3 mins

Top Software Weaknesses: Unmasking the Most Persistent Threats in 2023
How can the energy sector prepare for NIS2?

Security Solutions | 5 mins

How can the Energy Sector prepare for NIS2 Compliance?
Top Initial Access Vectors in 2023 and What to Do About Them

Threat Trends | 4 mins

Top Initial Access Vectors in 2023 and What to Do About Them
High-severity vulnerability found in WP Fastest Cache WordPress plugin

Vulnerability Alerts | 2 mins

High-severity vulnerability found in WP Fastest Cache WordPress plugin
Empowering EU Organizations: Navigating the Digital Security Landscape

Security Solutions | 2 mins

Empowering EU Organizations: Navigating the Digital Security Landscape
IDOR Explained: Everything you need to know

Threat Trends | 5 mins

IDOR Explained: Everything you need to know
Why is the Digital Operational Resilience Act a game-changer?

Security Solutions | 1 mins

Why is the Digital Operational Resilience Act a game-changer?
Choosing the Right Pen Test Partner

Security Solutions | 4 mins

Choosing the Right Pen Test Partner
Top 10 Cyber Security Resources to Follow

Security Solutions | 4 mins

Top 10 Cybersecurity Resources to Follow
New critical Citrix ADC and Gateway zero-day vulnerability

Vulnerability Alerts | 3 mins

New critical Citrix ADC and Gateway zero-day vulnerability
Managing your offensive security scope

Security Solutions | 4 mins

Managing your offensive security scope
Preparing for DORA: A Guide for Cybersecurity Experts

Security Solutions | 3 mins

Preparing for DORA: A Guide for Cybersecurity Experts
MOVEit Breach: Timeline of the Largest Hack of 2023

Threat Trends | 6 mins

MOVEit Breach: Timeline of the Largest Hack of 2023
Thinking Like a Hacker: The Foundation of Cyber Resiliency

Threat Trends | 4 mins

Thinking Like a Hacker: The Foundation of Cyber Resiliency
Revolutionizing offensive security with Generative AI

Security Solutions | 2 mins

Revolutionizing offensive security with Generative AI
Bracing for 2024: Cyber threats for modern manufacturers

Threat Trends | 3 mins

Bracing for 2024: Cyber threats for modern manufacturers
2022's Top Routinely Exploited Vulnerabilities Revealed in New Cybersecurity Advisory

Threat Trends | 4 mins

2022's Top Routinely Exploited Vulnerabilities Revealed in New Cybersecurity Advisory
Smart manufacturing: AI's impact and the security imperative

Threat Trends | 3 mins

Smart manufacturing: AI's impact and the security imperative
What is automated penetration testing?

Security Solutions | 4 mins

What is automated penetration testing?
How to prepare for NIS2

Security Solutions | 6 mins

How to prepare for NIS2
Predicting the next target: How threat actors choose their victims?

Threat Trends | 2 mins

Predicting the next target: How threat actors choose their victims?
The State of Initial Access Sales in 2023

Threat Trends | 4 mins

The State of Initial Access Sales in 2023