Must reads

Newsletter sign up

Get insights directly to your inbox

Subscribe to our newsletter for blog recaps, fresh tips, insights, and resource downloads.

Newsletter Example
Six Key Risks in Attack Surface Management for Critical Infrastructure

Threat Trends | 5 mins

Six Key Risks in Attack Surface Management for Critical Infrastructure
How CISOs can prepare for starting at a new company

Threat Trends | 5 mins

How CISOs can prepare for starting at a new company
M&A and cybersecurity: A case study in aviation industry

Threat Trends | 4 mins

M&A and cybersecurity: A case study in aviation industry
The Risk of Misconfigured Access Control Policies in Cloud Configuration

Threat Trends | 3 mins

The Risk of Misconfigured Access Control Policies in Cloud Configuration
APT Group Threat on Aviation Sector: Phases of Attack and Prevention

Threat Trends | 3 mins

APT Group Threat on Aviation Sector: Phases of Attack and Prevention
Major Cloud Misconfigurations - Publicly Accessible Storage Buckets

Threat Trends | 5 mins

Major Cloud Misconfigurations - Publicly Accessible Storage Buckets
The Five Hidden Cloud Risks

Threat Trends | 6 mins

The Five Hidden Cloud Risks

Threat Trends | 4 mins

Paris 2024 Olympics: Third-Party Cyber Risks Plague Global Events

Threat Trends | 3 mins

Paris 2024 Olympics Begins with  Cybersecurity Warnings
The Thin Line Between Black Hat and White Hat Hacking

Threat Trends | 5 mins

The Thin Line Between Black Hat and White Hat Hacking
Regulating Cyber Security In A Complex Landscape

Threat Trends | 7 mins

Regulating Cyber Security In A Complex Landscape
Top 10 Cybersecurity Incidents in the Financial Industry

Threat Trends | 5 mins

Top 10 Cybersecurity Incidents in the Financial Industry

Threat Trends | 3 mins

Being A Ciso: Getting The Basics Right
The Increasing Speed of Vulnerability Exploitation

Threat Trends | 3 mins

The Increasing Speed of Vulnerability Exploitation
How Cyberattacks Can Still Threaten Physical Stores

Threat Trends | 6 mins

How Cyberattacks Can Still Threaten Physical Stores
Challenges Managing the Retail Attack Surface

Threat Trends | 2 mins

Challenges Managing the Retail Attack Surface
Top 15 attacks on retail sector: Lessons learned

Threat Trends | 6 mins

Top 15 attacks on retail sector: Lessons learned
Web Store Security Unraveled for Retail

Threat Trends | 2 mins

Web Store Security Unraveled for Retail
Impact of Cyberthreats on Retail

Threat Trends | 4 mins

Understanding the Impact of Cyberthreats on the Retail Industry
RSA 2024: What CISOs Need to Know

Threat Trends | 3 mins

RSA 2024: What CISOs Need to Know
Breakdown of exploits in Q1 2024

Threat Trends | 4 mins

Breakdown of exploits in Q1 2024
In 2024, it’s time to create your CISO superhero

Threat Trends | 5 mins

In 2024, it’s time to create your CISO superhero
The Top Security Issues You Don't Think About

Threat Trends | 15 mins

The Top Security Issues You Don't Think About
Data Breach: 5 Key Impacts for Luxury Brands

Threat Trends | 2 mins

Data Breach: 5 Key Impacts for Luxury Brands
Understanding Insecure Design: A Deep Dive

Threat Trends | 7 mins

Understanding Insecure Design: A Deep Dive
Top Ten Security Misconfigurations

Threat Trends | 5 mins

Top Ten Security Misconfigurations hackers are exploiting
Hackers’ Top 5 Cybersecurity Predictions for 2024

Threat Trends | 17 mins

Hackers’ Top 5 Cybersecurity Predictions for 2024
Melvin Lammerts
Melvin Lammerts - Hacking Manager at Hadrian
Everything you need to know: DDoS attacks on the rise

Threat Trends | 4 mins

Everything you need to know: DDoS attacks on the rise
Insecure Direct Object Reference (IDOR) - A Deep Dive

Threat Trends | 5 mins

Insecure Direct Object Reference (IDOR) - A Deep Dive
Top Software Weaknesses: Unmasking the Most Persistent Threats in 2023

Threat Trends | 3 mins

Top Software Weaknesses: Unmasking the Most Persistent Threats in 2023
Top Initial Access Vectors in 2023 and What to Do About Them

Threat Trends | 4 mins

Top Initial Access Vectors in 2023 and What to Do About Them
IDOR Explained: Everything you need to know

Threat Trends | 5 mins

IDOR Explained: Everything you need to know
cURL and libcurl CVEs Unwrapped: Debunking the Hype

Threat Trends | 4 mins

cURL and libcurl CVEs Unwrapped: Debunking the Hype
Eden
Eden - Security Operations Analyst
MOVEit Breach: Timeline of the Largest Hack of 2023

Threat Trends | 6 mins

MOVEit Breach: Timeline of the Largest Hack of 2023
Thinking Like a Hacker: The Foundation of Cyber Resiliency

Threat Trends | 4 mins

Thinking Like a Hacker: The Foundation of Cyber Resiliency
Bracing for 2024: Cyber threats for modern manufacturers

Threat Trends | 3 mins

Bracing for 2024: Cyber threats for modern manufacturers
2022's Top Routinely Exploited Vulnerabilities Revealed in New Cybersecurity Advisory

Threat Trends | 4 mins

2022's Top Routinely Exploited Vulnerabilities Revealed in New Cybersecurity Advisory
Smart manufacturing: AI's impact and the security imperative

Threat Trends | 3 mins

Smart manufacturing: AI's impact and the security imperative
How Generative AI is Shaping Cybercrime

Threat Trends | 5 mins

How Generative AI is Shaping Cybercrime
Klaas
Klaas - AI Lead
Predicting the next target: How threat actors choose their victims?

Threat Trends | 2 mins

Predicting the next target: How threat actors choose their victims?
The State of Initial Access Sales in 2023

Threat Trends | 4 mins

The State of Initial Access Sales in 2023
What do hackers know about your attack surface?

Threat Trends | 3 mins

What do hackers know about your attack surface?
The Rise of Ransomware in 2023: A Surge in Cyber Extortion

Threat Trends | 6 mins

The Rise of Ransomware in 2023: A Surge in Cyber Extortion
Mikhail
Mikhail - Hacker Ops
Statistics Netherlands releases Cyber Security Monitor 2022

Threat Trends | 2 mins

Statistics Netherlands releases Cyber Security Monitor 2022

Threat Trends | 6 mins

Exposing the Fallacy: Security Through Obscurity vs. Modern Hackers
How Blind SQL Injection attacks sneak past your security

Threat Trends | 5 mins

How Blind SQL Injection attacks sneak past your security
Informed by trends here are the top five predictions for CTEM for the rest of 2023.

Threat Trends | 5 mins

Top 5 trends for Continuous Threat Exposure Management in 2023 and beyond
Initial Access Brokers sell access to corporate systems to ransomware gangs

Threat Trends | 5 mins

Securing your digital perimeter against Initial Access Brokers
Protect Your Business with Gartner's CTEM Framework

Threat Trends | 4 mins

Protect Your Business with Gartner's CTEM Framework
Olivier Beg talks about why 2023 is the year for software supply chain attacks

Threat Trends | 4 mins

Why 2023 is the year for software supply chain attacks
Olivier Beg
Olivier Beg - Head of Hacking
Zero-day vulnerabilities in edge infrastructure

Threat Trends | 4 mins

Zero-day vulnerabilities in edge infrastructure
Zero days aren’t your top concern: A patch management strategy is

Threat Trends | 4 mins

Zero days aren’t your top concern: A patch management strategy is
OWASP Top 10: The Rise of Server-Side Request Forgery (Part 1)

Threat Trends | 3 mins

OWASP Top 10: The Rise of Server-Side Request Forgery
Is ChatGPT democratizing cybercrime?

Threat Trends | 3 mins

Is ChatGPT democratizing cybercrime?
Mikhail
Mikhail - Hacker Ops
GoDaddy breach doesn't surprise Head of Hacking Olivier Beg

Threat Trends | 3 mins

Why the GoDaddy breach doesn't surprise me
Olivier Beg
Olivier Beg - Head of Hacking
Pandemic IoT increasing supply-chain vulnerabilities

Threat Trends | 4 mins

Pandemic IoT increasing supply-chain vulnerabilities