Must reads

Newsletter sign up

Get insights directly to your inbox

Subscribe to our newsletter for blog recaps, fresh tips, insights, and resource downloads.

Newsletter Example
IDOR Explained: Everything you need to know

Threat Trends | 5 mins

IDOR Explained: Everything you need to know
Why is the Digital Operational Resilience Act a game-changer?

Security Solutions | 1 mins

Why is the Digital Operational Resilience Act a game-changer?
cURL and libcurl CVEs Unwrapped: Debunking the Hype

Threat Trends | 4 mins

cURL and libcurl CVEs Unwrapped: Debunking the Hype
Eden
Eden - Security Operations Analyst
Choosing the Right Pen Test Partner

Security Solutions | 4 mins

Choosing the Right Pen Test Partner
Top 10 Cyber Security Resources to Follow

Security Solutions | 4 mins

Top 10 Cybersecurity Resources to Follow
New critical Citrix ADC and Gateway zero-day vulnerability

Vulnerability Alerts | 3 mins

New critical Citrix ADC and Gateway zero-day vulnerability
Managing your offensive security scope

Security Solutions | 4 mins

Managing your offensive security scope
Preparing for DORA: A Guide for Cybersecurity Experts

Security Solutions | 3 mins

Preparing for DORA: A Guide for Cybersecurity Experts
MOVEit Breach: Timeline of the Largest Hack of 2023

Threat Trends | 6 mins

MOVEit Breach: Timeline of the Largest Hack of 2023
Thinking Like a Hacker: The Foundation of Cyber Resiliency

Threat Trends | 4 mins

Thinking Like a Hacker: The Foundation of Cyber Resiliency
Revolutionizing offensive security with Generative AI

Security Solutions | 2 mins

Revolutionizing offensive security with Generative AI
Bracing for 2024: Cyber threats for modern manufacturers

Threat Trends | 3 mins

Bracing for 2024: Cyber threats for modern manufacturers
2022's Top Routinely Exploited Vulnerabilities Revealed in New Cybersecurity Advisory

Threat Trends | 4 mins

2022's Top Routinely Exploited Vulnerabilities Revealed in New Cybersecurity Advisory
Smart manufacturing: AI's impact and the security imperative

Threat Trends | 3 mins

Smart manufacturing: AI's impact and the security imperative
What is automated penetration testing?

Security Solutions | 4 mins

What is automated penetration testing?
How to prepare for NIS2

Security Solutions | 6 mins

How to prepare for NIS2
How Generative AI is Shaping Cybercrime

Threat Trends | 5 mins

How Generative AI is Shaping Cybercrime
Klaas
Klaas - AI Lead
Predicting the next target: How threat actors choose their victims?

Threat Trends | 2 mins

Predicting the next target: How threat actors choose their victims?
The State of Initial Access Sales in 2023

Threat Trends | 4 mins

The State of Initial Access Sales in 2023
What do hackers know about your attack surface?

Threat Trends | 3 mins

What do hackers know about your attack surface?
Why CVSS 4.0 isn’t all you need

Security Solutions | 6 mins

Why CVSS 4.0 isn’t all you need
Software Bill Of Materials: Achieve Total Asset Visibility

Security Solutions | 3 mins

Software Bill Of Materials: Achieve Total Asset Visibility
Sasja Storms
Sasja Storms - Head of Customer Success
The Rise of Ransomware in 2023: A Surge in Cyber Extortion

Threat Trends | 6 mins

The Rise of Ransomware in 2023: A Surge in Cyber Extortion
Mikhail
Mikhail - Hacker Ops
Offensive AI Strengthens your Defenses

Security Solutions | 3 mins

Offensive AI Strengthens your Defenses
Red team cybersecurity: Everything you need to know

Security Solutions | 4 mins

Red team cybersecurity: Everything you need to know
Attack Surface Management: Everything you need to know

Security Solutions | 6 mins

Attack Surface Management: Everything you need to know
Unlocking the Power of AI: Automation to Tackle Growing Threats

Security Solutions | 4 mins

Unlocking the Power of AI: Automation to Tackle Growing Threats
Statistics Netherlands releases Cyber Security Monitor 2022

Threat Trends | 2 mins

Statistics Netherlands releases Cyber Security Monitor 2022
Hadrian Security: Two Years of Growth, Innovation, and Customer Obsession

Inside Hadrian | 2 mins

Hadrian Security: Two Years of Growth, Innovation, and Customer Obsession
Adding context with Asset Tagging

Security Solutions | 3 mins

Adding context with Asset Tagging
Trends Shaping External Attack Surface Management (EASM) in 2023

Security Solutions | 3 mins

Trends Shaping External Attack Surface Management (EASM) in 2023
Mastering CISO Success with the Game-Changing Strategy of Continuous Threat Exposure Management

Security Solutions | 6 mins

Mastering CISO Success with the Game-Changing Strategy of Continuous Threat Exposure Management

Threat Trends | 6 mins

Exposing the Fallacy: Security Through Obscurity vs. Modern Hackers
Critical Citrix ADC and Gateway zero-day exploited

Vulnerability Alerts | 2 mins

Critical Citrix ADC and Gateway zero-day exploited
Continuous Monitoring: The Only Way to Beat Hackers

Security Solutions | 4 mins

Continuous Monitoring: The Only Way to Beat Threat Actors
Rogier Fischer
Rogier Fischer - CEO
Integrating Threat Intelligence: Inside the minds of modern adversaries

Security Solutions | 5 mins

Integrating Threat Intelligence: Inside the minds of modern adversaries
Rogier Fischer
Rogier Fischer - CEO
How Blind SQL Injection attacks sneak past your security

Threat Trends | 5 mins

How Blind SQL Injection attacks sneak past your security
Securing the retail sector’s attack surface

Security Solutions | 4 mins

Securing the retail sector’s attack surface
Pride Month at Hadrian

Inside Hadrian | 5 mins

Building an Inclusive Employer Brand: Attracting Diverse Talent
Stella
Stella - Talent Acquisition Specialist
CTEM is driven by the constantly changing threat landscape

Security Solutions | 8 mins

From Vulnerability Management to Continuous Threat Exposure Management
Detecting exposed sensitive files

Security Solutions | 4 mins

Detecting exposed sensitive files
External Attack Surface Management vs Continuous Automated Red Teaming

Security Solutions | 4 mins

External Attack Surface Management vs Continuous Automated Red Teaming
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a binding directive, Binding Operational Directive 23-02

Security Solutions | 2 mins

Safeguarding Network Assets: CISA's Directive
Fortinet issues patches for FortiOS RCE bug that

Vulnerability Alerts | 4 mins

Fortinet issues patches for FortiOS RCE bug that "may have been exploited"
Olivier Beg
Olivier Beg - Head of Hacking
Benefits of combining ASM with the power of Automated Security testing

Security Solutions | 5 mins

Securing the Digital Frontier: Synergizing EASM and Automated Security Testing
Rogier Fischer
Rogier Fischer - CEO
CART is a form of offensive security which simulates real-world attacks and assesses the security posture of an organization.

Security Solutions | 5 mins

What is Continuous Automated Red Teaming?
Clop Ransomware Group Likely Using MOVEit Vulnerability

Vulnerability Alerts | 3 mins

Clop Ransomware Group Likely Using MOVEit Vulnerability
Olivier Beg
Olivier Beg - Head of Hacking
Automated Security Monitoring: Unveiling the Black Box

Security Solutions | 4 mins

Automated Security Monitoring: Unveiling the Black Box
Rogier Fischer
Rogier Fischer - CEO
Informed by trends here are the top five predictions for CTEM for the rest of 2023.

Threat Trends | 5 mins

Top 5 trends for Continuous Threat Exposure Management in 2023 and beyond
Initial Access Brokers sell access to corporate systems to ransomware gangs

Threat Trends | 5 mins

Securing your digital perimeter against Initial Access Brokers
Continuous Threat Exposure Management: The Hacker’s Perspective

Security Solutions | 7 mins

Continuous Threat Exposure Management: The Hacker’s Perspective
Rogier Fischer
Rogier Fischer - CEO
Hackers are using misconfigured firewalls

Security Solutions | 5 mins

Fortifying the frontline: How hackers exploit misconfigured firewalls
EASM can help track down vulnerabilities

Security Solutions | 5 mins

What is External Attack Surface Management (EASM)
Hadrian Hacker Melvin speaks about Asset Discovery

Security Solutions | 7 mins

Behind Enemy Lines: Hacker Insights on Asset Discovery
Melvin Lammerts
Melvin Lammerts - Hacking Manager at Hadrian
Protect Your Business with Gartner's CTEM Framework

Threat Trends | 4 mins

Protect Your Business with Gartner's CTEM Framework
New vulnerability discovered in WordPress plugin

Vulnerability Alerts | 2 mins

New vulnerability discovered in WordPress plugin
Olivier Beg
Olivier Beg - Head of Hacking
Olivier Beg talks about why 2023 is the year for software supply chain attacks

Threat Trends | 4 mins

Why 2023 is the year for software supply chain attacks
Olivier Beg
Olivier Beg - Head of Hacking
Predicting web pages’ age with AI: A new weapon in the fight against cyberattacks

Security Solutions | 4 mins

Predicting web pages’ age with AI: A new weapon in the fight against cyberattacks
Klaas
Klaas - AI Lead
Zero-day vulnerabilities in edge infrastructure

Threat Trends | 4 mins

Zero-day vulnerabilities in edge infrastructure
To outsource or not to outsource: Automation is the key

Security Solutions | 4 mins

To outsource or not to outsource: Automation is the key
A company culture that wins

Inside Hadrian | 4 mins

A company culture that wins
Rogier Fischer
Rogier Fischer - CEO
Zero days aren’t your top concern: A patch management strategy is

Threat Trends | 4 mins

Zero days aren’t your top concern: A patch management strategy is
Bug Bounty and Attack Surface Management

Security Solutions | 3 mins

Bug bounty programs are great, but not enough – here’s why
Digitization and legacy systems in financial services: balancing the security risk

Security Solutions | 5 mins

Digitization and legacy systems in financial services: balancing the security risk
Women in cybersecurity: An interview with Alex Wells

Inside Hadrian | 4 mins

Women in cybersecurity: An interview with Alex Wells
Alex Wells
Alex Wells - Head of Product Marketing
OWASP Top 10: The Rise of Server-Side Request Forgery (Part 1)

Threat Trends | 3 mins

OWASP Top 10: The Rise of Server-Side Request Forgery
Hadrian won MT/Sprout Start-up of the Year 2023

Press Releases | 1 mins

Hadrian won MT/Sprout Start-up of the Year 2023
Leverage the hacker’s perspective in your security strategy

Security Solutions | 3 mins

Leverage the hacker’s perspective in your security strategy
Is ChatGPT democratizing cybercrime?

Threat Trends | 3 mins

Is ChatGPT democratizing cybercrime?
Mikhail
Mikhail - Hacker Ops
ABN AMRO Ventures backs Hadrian in its mission to arm enterprises with real-time exposure management from the Hacker’s perspective

Press Releases | 2 mins

ABN AMRO Ventures backs Hadrian in its mission to arm enterprises with real-time exposure management from the Hacker’s perspective
Selling technical solutions for non-tech people

Inside Hadrian | 3 mins

Selling technical solutions for non-tech people
Eden
Eden - Security Operations Analyst
A retreat that reflects the culture

Inside Hadrian | 4 mins

A retreat that reflects the culture
The human attack surface – an underestimated cyber security threat

Security Solutions | 6 mins

The human attack surface – an underestimated cyber security threat
In-person familiarity when working remote

Inside Hadrian | 6 mins

In-person familiarity when working remote
Online Assets to include in your Attack Surface Management Strategy

Security Solutions | 7 mins

Online Assets to include in your Attack Surface Management Strategy
Hacker Insights into Web Browser Automation

Inside Hadrian | 3 mins

Hacker Insights into Web Browser Automation
Melvin Lammerts
Melvin Lammerts - Hacking Manager at Hadrian
Complexity v. Simplicity: Designing Attack Graphs for Usability

Security Solutions | 4 mins

Complexity v. Simplicity: Designing Attack Graphs for Usability
How the context of your code bases can affect the security of your applications

Security Solutions | 5 mins

How the context of your code bases can affect the security of your applications
The importance of contextualising assets in ASM

Security Solutions | 4 mins

Connecting the Dots
Defining the Assets in Your Attack Surface Management (ASM) Strategy

Security Solutions | 6 mins

Defining the Assets in Your Attack Surface Management (ASM) Strategy
How to build a hacking community

Inside Hadrian | 5 mins

Building a Hacker Community
Ben Sadeghipour
Ben Sadeghipour
Hadrian provides certainty in an economic down turn

Security Solutions | 5 mins

Hadrian provides certainty in an economic down turn
Bringing creativity and storytelling to our dashboard

Inside Hadrian | 4 mins

Bringing creativity and storytelling to our dashboard
Mats Mulder
Mats Mulder - Product Manager
Forging a path for product development

Inside Hadrian | 5 mins

Forging my own path for product development
Wesley
Wesley - Product Manager
Event-driven testing balances continuity and intrusiveness

Security Solutions | 6 mins

Event-driven testing balances continuity and intrusiveness
Military officer to VP of Strategic Projects at Hadrian

Inside Hadrian | 5 mins

From Military Officer to Hadrian Legionnaire
Matan Shavit
Matan Shavit - Chief of Staff
Attack Surface Management vs Vulnerability Management

Security Solutions | 4 mins

Attack Surface Management vs Vulnerability Management
Remote working at Hadrian

Inside Hadrian | 3 mins

What it’s like working remotely at Hadrian
Birrighinde
Birrighinde - Senior Recruiter
Writing code that tests code

Inside Hadrian | 3 mins

How I write code that tests code at Hadrian
Jovana
Jovana - QA Engineer
Hadrian raises €10.5M in unsolicited seed round

Press Releases | 3 mins

Hadrian raises €10.5M in unsolicited seed round
Impact of COVID-19 on cloud security

Security Solutions | 5 mins

Impact of COVID-19 on cloud security
Chief of Staff Sofia on building company culture

Inside Hadrian | 3 mins

Building company culture from the ground up
Sofia Verkhoturova
Sofia Verkhoturova - Chief of Staff
Head of Growth Peter talks about where market research meets product design

Inside Hadrian | 5 mins

Where market research meets product design
Peter Hix
Peter Hix - Head of Growth
How Hadrian mimics a hacker with AI

Security Solutions | 3 mins

Mimicking a hacker with event-based AI
How Hadrian makes learning about tech less daunting

Inside Hadrian | 3 mins

How Hadrian makes learning about tech less daunting
Hadrian launches its personal goal setting program

Inside Hadrian | 3 mins

Hadrian launches its personal goal setting program
Rogier Fischer
Rogier Fischer - CEO
Designing with customer experience in mind

Inside Hadrian | 4 mins

Designing with customer experience in mind
Yujie
Yujie - UX/UI Designer
GoDaddy breach doesn't surprise Head of Hacking Olivier Beg

Threat Trends | 3 mins

Why the GoDaddy breach doesn't surprise me
Olivier Beg
Olivier Beg - Head of Hacking
Pandemic IoT increasing supply-chain vulnerabilities

Threat Trends | 4 mins

Pandemic IoT increasing supply-chain vulnerabilities
A peek into the backend code at Hadrian with Jakob

Inside Hadrian | 5 mins

A peek into the backend code at Hadrian with Jakob
Jakob
Jakob - Fullstack Developer