Dark Mode

    Free Trial
    Image of Eden Aizenkot
    • 11 min read

    Tales From the Encrypt: Horror Stories of Endpoint Insecurity

    Please join us as we take you on a journey through the looking glass and into the realm of haunted hacks. Here, misconfigured endpoints lay in wait, threatening to jump out from behind every...

    Tales From the Encrypt: Horror Stories of Endpoint Insecurity

    Please join us as we take you on a journey through the looking glass and into the realm of haunted hacks. Here, misconfigured endpoints lay in wait, threatening to jump out from behind every...

    11 min read

    Black Basta: Adversary Analysis

    Within months of its first public appearance, Black Basta left a significant mark in the realm of ransomware – tallying up 19 high-profile enterprise victims in the course of 100+ confirmed ...

    Black Basta: Adversary Analysis

    Within months of its first public appearance, Black Basta left a significant mark in the realm of ransomware – tallying up 19 high-profile enterprise victims in the course of 100+ confirmed ...

    15 min read
    Image of Evyatar Beni
    • 2 min read

    Lateral Movement is the Key Issue

    "We were forced to change and we did the best we could to keep the business alive during that massive change, but we know things were missed. It would be impossible not to have had something...

    Lateral Movement is the Key Issue

    "We were forced to change and we did the best we could to keep the business alive during that massive change, but we know things were missed. It would be impossible not to have had something...

    2 min read

    Missing OS Patches? You Leave the Door Wide Open to Hackers

    Attacks are becoming more sophisticated, hackers are becoming smarter, and so should be the defenders. The attacker eyeing your organization is looking for the misconfiguration that will let...

    Missing OS Patches? You Leave the Door Wide Open to Hackers

    Attacks are becoming more sophisticated, hackers are becoming smarter, and so should be the defenders. The attacker eyeing your organization is looking for the misconfiguration that will let...

    4 min read