ThreatLock

Flax Typhoon: Analysis and Mitigation of an Advanced Persistent Threat

All of our security tools, practices, and controls are based on a series of assumptions. What if those assumptions are wrong? Do our tools still protect our systems?

Ymir Vigfusson
May 13, 2025
ThreatLock

Cracking the Foundation: How Attackers Exploit Authentication Infrastructure

Multi-factor authentication (MFA) is a critical line of defense in cybersecurity, but the trust we place in its underlying infrastructure can be exploited.

Ymir Vigfusson
March 27, 2025
ThreatLock

How MFA Misconceptions Enable Lateral Movement

For all its merits, over reliance on Multi-Factor Authentication (MFA) has become a real security problem.

Ymir Vigfusson
August 6, 2024
ThreatLock

Social Engineering vs Phishing: Understanding the Differences

Cybercriminals employ various methods and techniques to exploit vulnerabilities and gain unauthorized access to sensitive information.

Árni Thor Árnason
April 16, 2024
ThreatLock

Addressing Unmanageable Vulnerabilities in Remote Desktop Protocol: What’s the Next Step?

Remote desktop protocol (RDP) has become an integral part of modern computing. It allows users to connect to and control remote computers, providing seamless access to resources and applications.

Ymir Vigfusson
April 7, 2024
ThreatLock

Zero Trust: How Organizations Can Implement Secure Networks

Cyber threats are becoming increasingly sophisticated, organizations need to adopt a proactive approach to network security.

Ymir Vigfusson
March 8, 2024
ThreatLock

What To Do About Cloud Data Loss Prevention

In today’s digital era, cloud technology has become an essential part of businesses. It allows organizations to store and access their data remotely, providing convenience and flexibility.

Árni Thor Árnason
February 29, 2024
ThreatLock

Deploy Keystrike in 20 Minutes

Try Keystrike in Your Environment for 30 Days