NewsZafran TeamZafran Announces Strategic Investment from Amex VenturesZafran TeamFebruary 24, 2026Read More2026-02-24
BlogYonatan KellerThe “Agentic Trojan Horse” Debate: How OpenClaw’s Convenience Model Opens Real-World Attack PathsYonatan KellerFebruary 17, 2026Read More2026-02-17
BlogYonatan KellerBeyond Prompt Injection: Over-Connected AI Apps Enable Enterprise BreachesYonatan KellerJanuary 28, 2026Read More2026-01-28
Threat ResearchGal ZabanChainLeak: Critical AI framework vulnerabilities expose data, enable cloud takeoverGal ZabanJanuary 20, 2026Read More2026-01-20
BlogYonatan KellerNo CVE, No Problem? The Dangerous Blind Spot in AI SecurityYonatan KellerJanuary 13, 2026Read More2026-01-13
BlogYonatan KellerThe 2025 Spike in Vulnerabilities Isn't the Full StoryYonatan KellerJanuary 8, 2026Read More2026-01-08
BlogYonatan KellerWill AI Revolutionize Vulnerability Exploitation? Yonatan KellerJanuary 6, 2026Read More2026-01-06
BlogZafran TeamZafran Triples ARR in $60M Round to Reinvent Exposure Management with Agentic AIZafran TeamDecember 2, 2025Read More2025-12-02
BlogSnir HavdalaIntroducing Agentic Exposure ManagementSnir HavdalaDecember 2, 2025Read More2025-12-02
BlogZafran TeamZafran Awarded Prestigious “Honorable Mention” in Gartner Magic Quadrant for Exposure Assessment PlatformsZafran TeamNovember 11, 2025Read More2025-11-11
BlogZafran TeamHow to Detect and Mitigate the Critical WSUS Exploit (CVE-2025-59287)Zafran TeamOctober 26, 2025Read More2025-10-26
BlogBen SeriAgentic Remediation™ Unlocks A New Approach To Solving Enterprise VulnerabilitiesBen SeriSeptember 15, 2025Read More2025-09-15
BlogJules GrossBeyond the Hype: Remediation Operations That Delivers ResultsJules GrossAugust 21, 2025Read More2025-08-21
BlogZafran TeamMobilizing Rapid Response To The SharePoint CrisisZafran TeamJuly 23, 2025Read More2025-07-23
BlogZafran TeamIran Poised for a Digital Counterstrike: A Practical Guide to Reduce Your ExposureZafran TeamJune 23, 2025Read More2025-06-23
BlogMiki SegallDefending What Matters: A Practical Guide to Modern Threat HuntingMiki SegallMay 14, 2025Read More2025-05-14
BlogSnir HavdalaIntroducing Remediation Operations (“RemOps”)Snir HavdalaApril 28, 2025Read More2025-04-28
BlogRick BosworthWe Are Not Patching Our Way Out Of This MessRick BosworthMarch 6, 2025Read More2025-03-06
BlogNathan RollingsUnderstanding the Role of Mitigation in CybersecurityNathan RollingsMarch 5, 2025Read More2025-03-05
BlogYonatan KellerBlack Basta Exposed: How a Ransomware Cartel Exploits VulnerabilitiesYonatan KellerFebruary 25, 2025Read More2025-02-25
BlogNathan RollingsFrom Playbook to Protection: What Football Can Teach Us About CTEMNathan RollingsFebruary 6, 2025Read More2025-02-06
BlogNathan RollingsStrategies for Improving Mitigation & Remediation - Vuln Management Survival GuideNathan RollingsFebruary 4, 2025Read More2025-02-04
BlogNathan RollingsStrategies for Improving Communication - Vuln Management Survival GuideNathan RollingsJanuary 29, 2025Read More2025-01-29
BlogNathan RollingsStrategies for Improving Assessment & Prioritization - Vuln Management Survival GuideNathan RollingsJanuary 21, 2025Read More2025-01-21
BlogRick BosworthThe TL;DR of the Latest Cybersecurity Executive OrderRick BosworthJanuary 16, 2025Read More2025-01-16
BlogNathan RollingsStrategies for Improving Detection - Vuln Management Survival GuideNathan RollingsJanuary 14, 2025Read More2025-01-14
BlogNathan RollingsStrategies for Improving Governance and Compliance - Vuln Management Survival GuideNathan RollingsJanuary 7, 2025Read More2025-01-07
BlogMiki SegallFrom Reactive to Proactive: Threat Hunting in the Cybersecurity BattlefieldMiki SegallDecember 18, 2024Read More2024-12-18
Threat ResearchThreat Research TeamBreakingWAF Technical AnalysisThreat Research TeamDecember 3, 2024Read More2024-12-03
Threat ResearchThreat Research TeamBreakingWAF: Widespread WAF Bypass Impacts Nearly 40% of Fortune 100 companiesThreat Research TeamDecember 3, 2024Read More2024-12-03
NewsThreat Research TeamMicrosoft cloud environments under active exploitation by a campaign utilizing access from on-prem accounts - Hunt and MitigateThreat Research TeamOctober 1, 2024Read More2024-10-01
BlogYonatan KellerFlax Typhoon: A Chinese State-Sponsored Group Exploiting 66 Vulnerabilities to Build a 260k Device BotnetYonatan KellerSeptember 22, 2024Read More2024-09-22
BlogSnir HavdalaIntroducing Proactive Exposure Hunting, the latest enhancement to Zafran’s Threat Exposure Management PlatformSnir HavdalaAugust 4, 2024Read More2024-08-04
BlogYonatan KellerCrowdstrike issue causes global scale outagesYonatan KellerJuly 19, 2024Read More2024-07-19
BlogRegreSSHion: RCE Vulnerability in OpenSSH Exposes Millions of ServersJuly 2, 2024Read More2024-07-02
BlogSnir HavdalaZafran and Recorded Future: Mitigating Risk Exposure with Actionable Threat IntelligenceSnir HavdalaJune 6, 2024Read More2024-06-06
BlogYonatan KellerState actor or cybercrime? The story of IntelBroker, the most under-rated threat actorYonatan KellerApril 25, 2024Read More2024-04-25
BlogYonatan KellerSupply chain shock: the XZ Utils Backdoor and the Operation that was Revealed Too Early (or too late?)Yonatan KellerApril 8, 2024Read More2024-04-08
NewsZafran TeamZafran Emerges from Stealth with Over $30M as the First Risk and Mitigation Platform to Fight Threat ExploitationZafran TeamMarch 28, 2024Read More2024-03-28