Must reads

Newsletter sign up

Get insights directly to your inbox

Subscribe to our newsletter for blog recaps, fresh tips, insights, and resource downloads.

Newsletter Example
Overcoming Security Challenges with Automated Vulnerability Validation

Research | 3 mins

Overcoming Security Challenges with Automated Vulnerability Validation
Injection Attacks, DNS Vulnerabilities, and Information Leaks Among Top Cyber Risks in 2024

Press Releases | 2 mins

Injection Attacks, DNS Vulnerabilities, and Information Leaks Among Top Cyber Risks in 2024
Robin Bell, CISO of Egress, sharing insights on security posture and business strategy

Research | 8 mins

CISO Conversations: Robin Bell of Egress on CISO's Role in M&As
Six Key Risks in Attack Surface Management for Critical Infrastructure

Threat Trends | 5 mins

Six Key Risks in Attack Surface Management for Critical Infrastructure
How Financial Institutions Can Stay Ahead of Supply Chain Attacks

Research | 5 mins

How Financial Institutions Can Stay Ahead of Supply Chain Attacks
CISO Conversations Vaibhav Patkar

Research | 5 mins

CISO Conversations: Veteran Vaibhav Patkar Bats for Mind over Matter
How Third-Party Vendors Increase Financial Institutions' Risks

Research | 3 mins

How Third-Party Vendors Increase Financial Institutions' Risks
Microsoft Patch Tuesday October 2024

Vulnerability Alerts | 5 mins

Microsoft Patch Tuesday October 2024: Five zero-days, 118 vulnerabilities fixed
World Aviation Festival 2024: Seven crucial factors in aviation cybersecurity

Security Solutions | 4 mins

World Aviation Festival 2024: Seven crucial factors in aviation cybersecurity
Everything CISOs need to know about NIS2

Security Solutions | 5 mins

Everything CISOs need to know about NIS2
CISO Conversations: ICT Group's Kelvin Rorive Says Absolute Security an Illusion

Research | 3 mins

CISO Conversations: ICT Group's Kelvin Rorive Says Absolute Security an Illusion
Eden discusses DevSecOps and Lean

Security Solutions | 4 mins

DevSecOps and Adaptive Project Framework (APF): A Security Perspective in Software Development
Eden
Eden - Security Operations Analyst

Research | 4 mins

Can LLMs improve subdomain enumeration?
Aviation sector cybersecurity: A primer for sector CISOs

Security Solutions | 5 mins

Aviation sector cybersecurity: A primer for sector CISOs
How CISOs can prepare for starting at a new company

Threat Trends | 5 mins

How CISOs can prepare for starting at a new company
Microsoft Patch Tuesday September 2024: Four Zero Days and More Patched

Vulnerability Alerts | 5 mins

Microsoft Patch Tuesday September 2024: Four Zero Days and More Patched
M&A and cybersecurity: A case study in aviation industry

Threat Trends | 4 mins

M&A and cybersecurity: A case study in aviation industry
Why automated penetration testing is essential for CTEM

Security Solutions | 5 mins

Why automated penetration testing is essential for CTEM
Attack Surface Management vs Vulnerability Management

Security Solutions | 4 mins

Attack Surface Management vs Vulnerability Management: The Difference Explained
DevSecOps and Extreme Programming: A Security Perspective in Software Development

Security Solutions | 4 mins

DevSecOps and Extreme Programming: A Security Perspective in Software Development
Eden
Eden - Security Operations Analyst
The Risk of Misconfigured Access Control Policies in Cloud Configuration

Threat Trends | 3 mins

The Risk of Misconfigured Access Control Policies in Cloud Configuration
APT Group Threat on Aviation Sector: Phases of Attack and Prevention

Threat Trends | 3 mins

APT Group Threat on Aviation Sector: Phases of Attack and Prevention
Major Cloud Misconfigurations - Publicly Accessible Storage Buckets

Threat Trends | 5 mins

Major Cloud Misconfigurations - Publicly Accessible Storage Buckets
Understanding Attack Surface Management: What It Is and Why It Matters

Security Solutions | 5 mins

Understanding Attack Surface Management: What It Is and Why It Matters
DevSecOps and Lean: A Security Perspective in Software Development

Security Solutions | 4 mins

DevSecOps and Lean: A Security Perspective in Software Development
Eden
Eden - Security Operations Analyst

Security Solutions | 2 mins

Unleashing SanicDNS for Reconnaissance
The Five Hidden Cloud Risks

Threat Trends | 6 mins

The Five Hidden Cloud Risks
Hadrian Security: Celebrating Three Years of Unwavering Growth and Innovation

Inside Hadrian | 2 mins

Hadrian Security: Celebrating Three Years of Unwavering Growth and Innovation
Rogier Fischer
Rogier Fischer - CEO

Threat Trends | 4 mins

Paris 2024 Olympics: Third-Party Cyber Risks Plague Global Events

Threat Trends | 3 mins

Paris 2024 Olympics Begins with  Cybersecurity Warnings

Security Solutions | 4 mins

World First Reconnaissance Tool - AI Path Age Detection
The Economics Of Automated Penetration Testing

Security Solutions | 5 mins

The Economics Of Automated Penetration Testing
The Thin Line Between Black Hat and White Hat Hacking

Threat Trends | 5 mins

The Thin Line Between Black Hat and White Hat Hacking
What you need to know: OpenSSH Vulnerability CVE-2024-6387

Vulnerability Alerts | 2 mins

Exim-tremely Critical? Do you need to worry about CVE-2024-39929
Microsoft July 2024 Patch Tuesday update

Vulnerability Alerts | 4 mins

Microsoft July 2024 Patch Tuesday update addresses four Zero-Day exploits, five critical vulnerabilities
How real is automated penetration testing?

Security Solutions | 5 mins

How real is automated penetration testing?
Regulating Cyber Security In A Complex Landscape

Threat Trends | 7 mins

Regulating Cyber Security In A Complex Landscape
NGNIX and Pathfinder Wordlists Release

Research | 2 mins

NGINX and Pathfinder Wordlists Release
Eden
Eden - Security Operations Analyst
What you need to know: OpenSSH Vulnerability CVE-2024-6387

Vulnerability Alerts | 2 mins

What you need to know: OpenSSH RegreSSHion CVE-2024-6387
DevSecOps and Kanban: A Security Perspective in Software Development

Security Solutions | 3 mins

DevSecOps and Kanban: A Security Perspective in Software Development
Eden
Eden - Security Operations Analyst
Breaking Barriers: LGBTQ+ Inclusion in Cybersecurity

Inside Hadrian | 3 mins

Breaking Barriers: LGBTQ+ Inclusion in Cybersecurity
Eden
Eden - Security Operations Analyst
Top 10 Cybersecurity Incidents in the Financial Industry

Threat Trends | 5 mins

Top 10 Cybersecurity Incidents in the Financial Industry

Report | 5 mins

Getting GDPR Right: A Ten-point Checklist for the New CISO

Threat Trends | 3 mins

Being A Ciso: Getting The Basics Right
The Increasing Speed of Vulnerability Exploitation

Threat Trends | 3 mins

The Increasing Speed of Vulnerability Exploitation
How Cyberattacks Can Still Threaten Physical Stores

Threat Trends | 6 mins

How Cyberattacks Can Still Threaten Physical Stores
DevSecOps and Scrum: A Security Perspective in Software Development

Security Solutions | 2 mins

DevSecOps and Scrum: A Security Perspective in Software Development
Eden
Eden - Security Operations Analyst
Challenges Managing the Retail Attack Surface

Threat Trends | 2 mins

Challenges Managing the Retail Attack Surface
Prevent cloud misconfiguration to secure your organization

Security Solutions | 3 mins

Configuring the Cloud at Infosecurity Europe: Safeguarding Your Business
How To Incorporate Penetration Testing into your CTEM Program

Security Solutions | 6 mins

How To Incorporate Penetration Testing into your CTEM Program
Top 15 attacks on retail sector: Lessons learned

Threat Trends | 6 mins

Top 15 attacks on retail sector: Lessons learned
Why EASM is essential to CTEM

Security Solutions | 4 mins

Why EASM is essential to CTEM
Web Store Security Unraveled for Retail

Threat Trends | 2 mins

Web Store Security Unraveled for Retail
Impact of Cyberthreats on Retail

Threat Trends | 4 mins

Understanding the Impact of Cyberthreats on the Retail Industry
DevSecOps and Agile: A Security Perspective in Software Development

Security Solutions | 4 mins

DevSecOps and Agile: A Security Perspective in Software Development
Eden
Eden - Security Operations Analyst
Is Automated Penetration Testing the Future?

Security Solutions | 4 mins

Is Automated Penetration Testing the Future?
RSA 2024: What CISOs Need to Know

Threat Trends | 3 mins

RSA 2024: What CISOs Need to Know

Security Solutions | 4 mins

The Top 5 CTEM Use Cases
Offensive cybersecurity: What is it and what tools do you need?

Security Solutions | 4 mins

Offensive cybersecurity: What is it and what tools do you need?
Is Penetration Testing Dated?

Security Solutions | 3 mins

Is Penetration Testing Dated?
Critical vulnerability discovered

Vulnerability Alerts | 3 mins

Critical Palo Alto Networks PAN-OS zero-day exploited
Bug-Proofing Your Rapid Development Cycle: The Power of the Automated PenTest

Security Solutions | 5 mins

Bug-Proofing Your Rapid Development Cycle: The Power of the Automated PenTest
DevSecOps and Waterfall: A Security Perspective in Software Development

Security Solutions | 2 mins

DevSecOps and Waterfall: A Security Perspective in Software Development
Eden
Eden - Security Operations Analyst
Breakdown of exploits in Q1 2024

Threat Trends | 4 mins

Breakdown of exploits in Q1 2024
In 2024, it’s time to create your CISO superhero

Threat Trends | 5 mins

In 2024, it’s time to create your CISO superhero
The Top Security Issues You Don't Think About

Threat Trends | 15 mins

The Top Security Issues You Don't Think About
Can penetration testing be automated?

Security Solutions | 4 mins

Automated security testing is on the rise
How NIS2 Will Impact Your Industry

Security Solutions | 3 mins

How NIS2 Will Impact Your Industry
Offensive AI Strengthens your Defenses

Security Solutions | 5 mins

Security is at the heart of digital transformation
The EU’s new NIS2 cybersecurity directive: Everything you need to know

Security Solutions | 5 mins

The EU’s new NIS2 cybersecurity directive: Everything you need to know
Empowering Women in Cybersecurity: An Interview with Anique Lodewijkx

Inside Hadrian | 3 mins

Empowering Women in Cybersecurity: An Interview with Anique Lodewijkx
Recruiting to reduce risk: Addressing the cybersecurity skills gap

Security Solutions | 5 mins

Recruiting to reduce risk: Addressing the cybersecurity skills gap
TeamCity Authentication Bypass Vulnerabilities Addressed (CVE-2024-27198 and CVE-2024-27199)

Vulnerability Alerts | 3 mins

TeamCity Authentication Bypass Vulnerabilities Addressed (CVE-2024-27198 and CVE-2024-27199)
Simplifying patching and security hardening

Security Solutions | 4 mins

Simplifying patching and security hardening
The GigaOm Radar Report for Attack Surface Management 2024 has been released, and Hadrian is the only vendor recognized as both a Leader and Outperformer

Security Solutions | 2 mins

GigaOm Radar: Hadrian is the only vendor recognized as both a Leader and Outperformer
Hadrian Recognized as the Only Vendor That is Both a Leader and Outperformer in GigaOm Radar Report for Attack Surface Management 2024

Press Releases | 2 mins

Hadrian Recognized in GigaOm Radar Report for Attack Surface Management 2024
The Development Methodologies: A Deeper Look

Security Solutions | 5 mins

The Development Methodologies: A Deeper Look
Eden
Eden - Security Operations Analyst
Five Ways to Make Your Security Team More Efficient

Security Solutions | 5 mins

Five Ways to Make Your Security Team More Efficient
Why DevSecOps is the best bet for secure development

Security Solutions | 5 mins

Why DevSecOps is the best bet for secure development
Data Breach: 5 Key Impacts for Luxury Brands

Threat Trends | 2 mins

Data Breach: 5 Key Impacts for Luxury Brands
Active exploitation of Ivanti Connect Secure and Policy Secure Gateways

Vulnerability Alerts | 4 mins

Active exploitation of Ivanti Connect Secure and Policy Secure Gateways
A DORA Compliance Checklist for Financial Resilience

Security Solutions | 2 mins

A DORA Compliance Checklist for Financial Resilience
Exploits Published for Jenkins Automation Server

Vulnerability Alerts | 2 mins

Exploits Published for Jenkins Automation Server
How to pick an attack surface management solution?

Security Solutions | 4 mins

How to pick an attack surface management solution?
Understanding Insecure Design: A Deep Dive

Threat Trends | 7 mins

Understanding Insecure Design: A Deep Dive
Does DevSecOps Make a Difference?

Security Solutions | 3 mins

Does DevSecOps Make a Difference?
Eden
Eden - Security Operations Analyst
Top Ten Security Misconfigurations

Threat Trends | 5 mins

Top Ten Security Misconfigurations hackers are exploiting
Can penetration testing be automated?

Security Solutions | 3 mins

Can penetration testing be automated?
Hackers’ Top 5 Cybersecurity Predictions for 2024

Threat Trends | 17 mins

Hackers’ Top 5 Cybersecurity Predictions for 2024
Melvin Lammerts
Melvin Lammerts - Hacking Manager at Hadrian
How unknown risks are causing cybersecurity strategies to evolve

Vulnerability Alerts | 4 mins

How Unknown Risks Are Causing Cybersecurity Strategies to Evolve
Everything you need to know: DDoS attacks on the rise

Threat Trends | 4 mins

Everything you need to know: DDoS attacks on the rise
What is DevSecOps?

Security Solutions | 2 mins

What is DevSecOps?
Mobilize fast remediation with Secure Share

Security Solutions | 4 mins

Mobilize fast remediation with Secure Share
Insecure Direct Object Reference (IDOR) - A Deep Dive

Threat Trends | 5 mins

Insecure Direct Object Reference (IDOR) - A Deep Dive
The importance of building a Software Bill of Materials (SBOM)

Security Solutions | 6 mins

The importance of building a Software Bill of Materials (SBOM)
Top Software Weaknesses: Unmasking the Most Persistent Threats in 2023

Threat Trends | 3 mins

Top Software Weaknesses: Unmasking the Most Persistent Threats in 2023
How can the energy sector prepare for NIS2?

Security Solutions | 5 mins

How can the Energy Sector prepare for NIS2 Compliance?
Top Initial Access Vectors in 2023 and What to Do About Them

Threat Trends | 4 mins

Top Initial Access Vectors in 2023 and What to Do About Them
High-severity vulnerability found in WP Fastest Cache WordPress plugin

Vulnerability Alerts | 2 mins

High-severity vulnerability found in WP Fastest Cache WordPress plugin
Empowering EU Organizations: Navigating the Digital Security Landscape

Security Solutions | 2 mins

Empowering EU Organizations: Navigating the Digital Security Landscape