MACHINE IDENTITY THREAT MODEL

The industry standard framework to protect machine identities

RECENTLY ADDED

The latest threat actors and tools that your organization should learn about
Facefish
Facefish

Facefish is a Linux rootkit that targets Linux x64 systems to inject maliciou...

Ebury
Ebury

Ebury is an SSH backdoor targeting Linux operating systems. Attackers require...

Windigo
Windigo

The Windigo group has been operating since at least 2011, compromising thousa...

UNC1945
UNC1945

UNC1945 is a threat group active since 2018 and is known to target telecommun...

MOST VISITED

The most visited techniques and threat actors
SSH Hijacking
SSH Hijacking

Adversaries may hijack a legitimate user's SSH session to move laterally with...

Exploit Public-Facing Application
Exploit Public-Facing Application

Adversaries may attempt to take advantage of a weakness or a vulnerability in...

APT18
APT18

APT18 is a threat group that has operated since at least 2009 and has targete...

Active Scanning
Active Scanning

Before compromising a victim, adversaries may execute active Reconnaissance s...

THREAT REPORTS

Venafi’s publications about recent threats
Blog
Blog

Code Signing Weakness Allows Breach of US Treasury, FireEye & Others

Blog
Blog

The Growing Risk of Malware Attacks Using Machine Identities

Blog
Blog

Previously limited only to sophisticated threat actors, SSH was exploited in ...

Blog
Blog

Critical Vulnerability in F5 BIG-IP Devices Exploited in the Wild

Blog
Blog

More records. This record will be available under see all