7/31/2025
Explore how we are redefining vulnerability management through real-time visibility, tailored mitigations, and actionable insights, empowering security teams to effectively reduce risks.
Read more 7/30/2025
AI-coded software brings common exploitation risks into your org. Learn how runtime protection can help.
Read more 7/29/2025
New feature, Unused Software, helps security teams reduce risk, cut costs, and shrink their attack surface.
Read more 5/14/2025
Attackers increasingly prefer to leverage legitimate software already present in target environments rather than introducing malicious executables.
Read more 4/23/2025
At Spektion, our continuous monitoring of software behavior across thousands of products in enterprise environments has revealed a concerning pattern: remotely accessible Named Pipes are far more prevalent than most security teams realize.
Read more 4/8/2025
Breaking the Cycle of Ineffective Vulnerability Management with its Purpose-Built Solution Harnessing Runtime Insights
Read more 3/27/2025
On the heels of releasing the macOS sensor earlier this week, its as good a time as ever to dig into some mac specific risks. Having spent the majority of my career attacking Windows its fun to peak under the macOS hood.
Read more 2/6/2025
One of the more common risks I still see in commercial software is applications that dynamically allocate memory in external processes—for instance, by creating memory pages with both writable and executable permissions.
Read more