Five Reasons to Visit Centrify Booth #N6445 at RSA 2019

The 2019 RSA Conference is just around the corner, coming up March 4-8 at the Moscone Center in San Francisco! If you’ve never attended an...

Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities

Executive Summary Throughout the autumn of 2018 we analyzed a long-standing (and still active at that time) cyber-espionage campaign that was primarily targeting foreign diplomatic...

DNS Flag Day

Read more

Putting the Reins in Good Hands

After over 300 blog posts as CEO of Centrify, this will be my last Centrify blog post. The reason is because after having co-founded Centrify...

Razy in search of cryptocurrency

Last year, we discovered malware that installs a malicious browser extension on its victim’s computer or infects an already installed extension. To do so,...

Latest article

Cyber attacks enabled by basic failings, Palo Alto analysis finds

Cyberattacks are moving faster, shrinking the gap between initial compromise and bad consequences, and the advent of AI is accelerating...

Malware in the Wild as Malicious Fork of Legitimate Triton App Surfaces on GitHub

A malicious fork of the legitimate macOS application Triton has surfaced on GitHub, exploiting open-source repositories to distribute malware. The fraudulent repository, created...

AI in the Middle: Turning Web-Based AI Services into C2 Proxies & The Future...

Key Points Check Point Research (CPR) has discovered that certain AI assistants that support web browsing or URL fetching can be abused as covert...

Western cyber alliances risk fragmenting in new world order

The conduct of powerful nations is causing knock-on effects in the cyber world as long-standing security frameworks appear increasingly precarious - Read more