Dark Mode

    Free Trial

    Black Basta: Adversary Analysis

    Within months of its first public appearance, Black Basta left a significant mark in the realm of ransomware – tallying up 19 high-profile enterprise victims in the course of 100+ confirmed ...

    Black Basta: Adversary Analysis

    Within months of its first public appearance, Black Basta left a significant mark in the realm of ransomware – tallying up 19 high-profile enterprise victims in the course of 100+ confirmed ...

    15 min read
    Image of Bar Shay
    • 6 min read

    Defending Against RegreSSHion (CVE-2024-6387)

    After a CVE is published, the race is on. Often a good amount of time passes before any patches are issued. Of course, sometimes the patch never comes. Best case scenario, patches are releas...

    Defending Against RegreSSHion (CVE-2024-6387)

    After a CVE is published, the race is on. Often a good amount of time passes before any patches are issued. Of course, sometimes the patch never comes. Best case scenario, patches are releas...

    6 min read
    Image of Jake Dillon
    • 7 min read

    Automating Secure Device Configuration Life Cycle with GYTPOL

    In today’s digital landscape, organizations face relentless cyber threats, with ransomware incidents posing a significant risk.

    Automating Secure Device Configuration Life Cycle with GYTPOL

    In today’s digital landscape, organizations face relentless cyber threats, with ransomware incidents posing a significant risk.

    7 min read
    Image of Tal Kollender
    • 9 min read

    Building a Fortress: Best Practices in Device Hardening

    At a time when cyber threats are increasingly sophisticated, understanding and implementing device hardening is more crucial than ever.

    Building a Fortress: Best Practices in Device Hardening

    At a time when cyber threats are increasingly sophisticated, understanding and implementing device hardening is more crucial than ever.

    9 min read
    • 6 min read

    LockBit 2.0: Insights and Counter-measures

    The cyber threat landscape has been significantly heightened by the emergence of LockBit 2.0, an advanced and pernicious form of ransomware.

    LockBit 2.0: Insights and Counter-measures

    The cyber threat landscape has been significantly heightened by the emergence of LockBit 2.0, an advanced and pernicious form of ransomware.

    6 min read
    Image of Tal Kollender
    • 9 min read

    Legacy Windows Settings: A Security Time Bomb in Modern Operating Systems

    In the fast-paced world of technology, where innovation is a constant, it’s crucial to ensure that our operating systems remain secure.

    Legacy Windows Settings: A Security Time Bomb in Modern Operating Systems

    In the fast-paced world of technology, where innovation is a constant, it’s crucial to ensure that our operating systems remain secure.

    9 min read
    Image of Gilad Raz
    • 5 min read

    Maximizing Endpoint Security and Swift Remediation in M&A Processes with GYTPOL

    In the complex world of mergers and acquisitions (M&A), where cybersecurity and compliance are essential, the security of endpoints and the rapid resolution of security gaps are critical...

    Maximizing Endpoint Security and Swift Remediation in M&A Processes with GYTPOL

    In the complex world of mergers and acquisitions (M&A), where cybersecurity and compliance are essential, the security of endpoints and the rapid resolution of security gaps are critical...

    5 min read
    Image of Yakov Kogan
    • 8 min read

    Reliable Automation for Secure Configuration and Device Hardening

    Our dependence on our IT platforms and the need to secure them is a non-stop challenge.

    Reliable Automation for Secure Configuration and Device Hardening

    Our dependence on our IT platforms and the need to secure them is a non-stop challenge.

    8 min read
    • 8 min read

    Protecting Against Cyber Attacks By Automatically Securing Device Configurations

    Threat actors are taking advantage of misconfigurations on various devices, such as PCs, laptops, and servers. In fact, according to Microsoft Cyber Signals’ latest report (August 2022), 80%...

    Protecting Against Cyber Attacks By Automatically Securing Device Configurations

    Threat actors are taking advantage of misconfigurations on various devices, such as PCs, laptops, and servers. In fact, according to Microsoft Cyber Signals’ latest report (August 2022), 80%...

    8 min read