Explore our latest research, insights, and guidance on emerging security threats and best practices
We regularly publish our security findings, guidance, and analysis to help organizations stay ahead of emerging threats.
A critical remote code execution vulnerability in Veeam Backup & Replication allows authenticated domain users to execute arbitrary code on the backup server.
Matt Potter
Security Engineer
Three critical zero-day vulnerabilities in VMware ESXi, Workstation, and Fusion have been actively exploited in the wild, requiring immediate attention from organizations.
Matt Potter
Security Engineer
Understanding the critical Log4j vulnerability and its impact on enterprise security.
Matt Potter
Security Engineer
Supply chain attacks have become one of the most sophisticated threats organizations face today. Learn how attackers compromise software distribution channels and what you can do to protect your organization.
Matt Potter
Security Engineer
Modern web applications require modern security controls. Learn how Content Security Policy (CSP) and other advanced browser security features can protect your applications from common attacks.
Thomas Bereckzy
Security Engineer
Human error remains one of the biggest security vulnerabilities in any organization. Learn how to design and implement a security awareness program that actually changes behavior.
Maryna Perehud
Security Education Specialist
Subscribe to our research newsletter to receive the latest security insights directly in your inbox.
We respect your privacy. Unsubscribe at any time.