Centrify Launches Zero Trust Security Network Ecosystem

The world has changed. I’m not sure if it was the HBO breach, Equifax, Yahoo, or one of the many breaches since, but after...

LuckyMouse hits national data center to organize country-level waterholing campaign

What happened? In March 2018 we detected an ongoing campaign targeting a national data center in the Central Asia that we believe has been active...

Five Reasons to Kill Off the Password

Australia recognised the security problem posed by passwords through widespread media coverage of Centrify’s warning issued on World Password Day, which occurred on May...

451 Research: Centrify Goes “All In” on the Zero Trust Movement

451 Research recently published an impact report recognizing Centrify as one of the early vendors to embrace the Zero Trust concept, which is a...

A MitM extension for Chrome

Browser extensions make our lives easier: they hide obtrusive advertising, translate text, help us choose in online stores, etc. There are also less desirable...

SecurIT: Making Zero Trust a Reality for CIOs and CISOs

On June 13, C-level and senior management leaders from global companies spanning multiple industries will gather in San Francisco at SecurIT: the Zero Trust...

DG CUE 2018

DG CUE - Read more

FIFA public Wi-Fi guide: which host cities have the most secure networks?

We all know how easy it is for users to connect to open Wi-Fi networks in public places. Well, it is equally straightforward for...

Latest article

Building an AI-powered defense-in-depth security architecture for serverless microservices

Enterprise customers face an unprecedented security landscape where sophisticated cyber threats use artificial intelligence to identify vulnerabilities, automate attacks, and evade detection...

Fake CAPTCHA Scam Tricks Windows Users Into Installing Malware

A fake CAPTCHA scam is tricking Windows users into running PowerShell commands that install StealC malware and steal passwords, crypto wallets, and more. The post...

16th February – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 16th February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Dutch telecom provider...

Vulnerabilities in Password Managers Allow Hackers to View and Change Passwords

Security researchers have challenged end-to-end encryption claims from popular commercial password managers - Read more