Skip to main content
Show submenu for WHY CODEHUNTER
WHY CODEHUNTER
Why CodeHunter
Benefits by Role
Industries We Protect
Show submenu for PRODUCT
PRODUCT
Product Overview
Partners / Integrations
PRICING
COMPANY
RESOURCES
Open main navigation
Close main navigation
Show submenu for WHY CODEHUNTER
WHY CODEHUNTER
WHY CODEHUNTER
Why CodeHunter
Benefits by Role
Industries We Protect
Show submenu for PRODUCT
PRODUCT
PRODUCT
Product Overview
Partners / Integrations
PRICING
COMPANY
RESOURCES
REQUEST A DEMO
REQUEST A DEMO
NEWS & BLOG
Stay up to date on cyber trends and industry insights.
All articles
Nov 21, 2024
Securing Legacy Systems in Healthcare
Read article
Nov 19, 2024
Data Breach Response: How Healthcare Organizations Can Maintain Trust
Read article
Nov 14, 2024
CodeHunter Verdicts: Prioritize Threats, Respond More Efficiently
Read article
Nov 12, 2024
Prioritizing Business Continuity in Cybersecurity Response
Read article
Nov 7, 2024
Responding to Unknown Malicious Threats: Cybersecurity Analyst's Guide
Read article
Nov 4, 2024
Cyber-Physical Threats: Malware's Newest Manifestation
Read article
Oct 31, 2024
Securing the Entertainment Industry's Digital Transformation
Read article
Oct 29, 2024
Protecting Intellectual Property from Cyber Criminals
Read article
Oct 24, 2024
How a Defense-in-Depth Strategy Supports Cybersecurity Awareness
Read article
Oct 22, 2024
The Critical Importance of Cybersecurity Awareness
Read article
Oct 14, 2024
The Power of Analysis Verdicts: Accelerating The Threat Triage Process
Read article
Oct 10, 2024
Advanced Persistent Threats: Proactive Defense for Financial Services
Read article
Oct 8, 2024
The Rising Threat of Algorithmic Trading Exploits
Read article
Oct 3, 2024
Cybersecurity Market Manipulation: Preventing Fraudulent Activity
Read article
Oct 2, 2024
Strengthening Transportation Cybersecurity: Lessons from Prior Attacks
Read article
Sep 27, 2024
Cybersecurity Supply Chain Risks in the Transportation Industry
Read article
Sep 25, 2024
Defending the Energy Industry from Nation-State Cyberattacks
Read article
Sep 20, 2024
Defending the Utilities Industry from Emerging Cybersecurity Threats
Read article
Sep 18, 2024
Cybersecurity For Healthcare CISOs: Safeguard Against Vulnerabilities
Read article
Sep 12, 2024
Securing Skills: Modern Cybersecurity Hiring Practices
Read article
Sep 10, 2024
The Importance of Executive Buy-In for Cybersecurity Initiatives
Read article
Sep 6, 2024
Tackling the Tide of Malicious Email Attachments
Read article
Sep 4, 2024
The Strengths and Weaknesses of EDR Solutions for Modern Cybersecurity
Read article
Sep 2, 2024
Beyond the Flag: The Post-EDR Detection Process
Read article
Aug 23, 2024
Behavioral Analysis: Enhanced Threat Intelligence
Read article
Aug 21, 2024
Proactive Protection Against Custom Malware
Read article
Aug 15, 2024
The Complexity of Reverse Malware Engineering: Challenges and Insights
Read article
Aug 13, 2024
Enhance EDR Capabilities with CodeHunter: A Comprehensive Solution
Read article
Aug 9, 2024
The Hidden Menace: How to Mitigate Insider Threats
Read article
Aug 7, 2024
Understanding Multi-Step Malware: Complex Detection and Analysis
Read article
Aug 1, 2024
Financial Compliance for CISOs in 2024
Read article
Jul 30, 2024
Third-Party Integration Risk Management: Monitor to Mitigate
Read article
Jul 26, 2024
Cybersecurity Reporting: Automate Generation to Optimize Workflow
Read article
Jul 22, 2024
Single Security Platform vs. Integrated Best-of-Breed Solutions
Read article
Jul 19, 2024
Behavioral Analysis: Beyond Traditional Detection
Read article
Jul 17, 2024
Cybersecurity Incident Response: Time is of the Essence
Read article
Jul 12, 2024
Reputation Management: Protect Customer Data and Your Image
Read article
Jul 10, 2024
Double Extortion: The Latest Malicious Money Grab
Read article
Jul 3, 2024
Secure Data Backup: What to Know
Read article
Jul 1, 2024
CodeHunter and SentinelOne: Better Together
Read article
Jun 26, 2024
Minimize False Positives with Integrated Threat Analysis
Read article
Jun 21, 2024
Adapting to the Cybersecurity Skills Gap
Read article
Jun 20, 2024
Train Employees to Reduce Vulnerability to Phishing
Read article
Jun 12, 2024
Embracing Reality: Managing Cybersecurity Breaches with Resilience
Read article
Jun 10, 2024
It’s Time to Modernize Your Legacy Applications
Read article
Jun 6, 2024
Automated Defense Protects Against Software Supply Chain Attacks
Read article
May 31, 2024
Generative AI Makes Hacking Dangerously Easy
Read article
May 23, 2024
Military OPSEC Strategies to Protect Your Business
Read article
May 22, 2024
Proactive Prevention: How to Defend Against Zero-Day Attacks
Read article
Apr 30, 2024
Strengthening Defense-in-Depth With Automated Malware Detection & Analysis
Read article
Apr 22, 2024
Malware-as-a-Service: A Top Threat to Organizations in 2024
Read article
Oct 30, 2023
Elevating Malware Signature Creation to New Heights
Read article
Oct 24, 2023
The Revolutionary Impact of Zero-Day Malware Identification on the Industry: The Urgency of Addressing Malware Threats
Read article
Sep 14, 2022
If We Really Cared About the Cybersecurity Talent Shortage…
Read article
Aug 17, 2022
CodeHunter: Bridging The Cybersecurity Skills Gap
Read article
Aug 4, 2022
CodeHunter: Staying Ahead of Advanced Malware
Read article
Jul 27, 2022
CodeHunter Launches New Enterprise Solution
Read article
Jul 7, 2022
CodeHunter: Automating Cybersecurity
Read article
Jun 21, 2022
CodeHunter: A New Solution for Federal Cybersecurity
Read article
Jun 9, 2022
CodeHunter: A New Solution for Financial Services Cybersecurity
Read article
Jun 2, 2022
CodeHunter: A New Solution for Healthcare Cybersecurity
Read article
May 19, 2022
10 Steps for Writing Software Development Contracts with SSDF in Mind
Read article
May 19, 2022
What Executive Order 14028 Gets Right on Cybersecurity
Read article
Apr 25, 2022
5 HIPAA Cybersecurity Requirements for CISOs
Read article
Mar 30, 2022
Sometimes It’s Not About Winning; It’s About Not Losing
Read article
Mar 25, 2022
5 Banking Cybersecurity Mistakes We See Way Too Often
Read article
Mar 22, 2022
WTF is Cryptojacking and Why Bank CISOs Should Care
Read article
Feb 18, 2022
Cyberattack Simulation Exercise for Banks
Read article
Feb 18, 2022
7 IoT Medical Devices That Are Hackable
Read article
Feb 10, 2022
You’re Not Their Valentine, You're Their Victim!
Read article
Feb 10, 2022
5 Ways Pharma Can Mitigate Third-Party Cyber Risks
Read article
Feb 7, 2022
The True Cost of a Data Breach in 2022
Read article
Feb 7, 2022
$1,270,000: Why Hospitals Pay Millions to Recover From a Cyberattack | The Real Cost of Recovering From a Ransomware Attack
Read article
Feb 7, 2022
Formjacking Exposes Mortgage Lenders to Cyber Threats
Read article
Feb 2, 2022
11 Wild Ransomware Attack Statistics for 2022
Read article
Jan 24, 2022
Should Hospitals Pay Off Cyber Terrorists?
Read article
Jan 21, 2022
The Nauseating Truth About FIN12 for Hospital CISOs
Read article
Jan 19, 2022
Letter From CodeHunter's CEO, Larry Roshfeld: 2022 is the Year of Cybersecurity. AGAIN. (WTF?!)
Read article
Jan 12, 2022
Call the Feds! What Bank CISOs Need to Do After a Data Breach
Read article
Jan 4, 2022
Cybersecurity Predictions For 2022 — CodeHunter CEO Larry Roshfeld Featured in Technical.ly
Read article
Jan 4, 2022
It's 2022. Why Isn’t Everybody Talking About Malware Hunting and Shadow IT?
Read article
Dec 27, 2021
The Telesurgery Industry Is Flirting With Cyber Criminals
Read article
Dec 22, 2021
What Is Malware — and Why You Should Give a Sh*t
Read article
Dec 20, 2021
Post-Pandemic Banks Should Be Ready to Dump Two-Factor Authentication
Read article
Dec 8, 2021
A Pivotal Time for Innovation in Cyber — CodeHunter CEO Larry Roshfeld Featured in Technical.ly
Read article
Dec 7, 2021
Letter From CodeHunter's CEO, Larry Roshfeld: Why We Built CodeHunter
Read article
Dec 7, 2021
CodeHunter COO Chris O'Ferrell Featured in Forbes
Read article
Dec 7, 2021
How the U.S. Is Raising the Bar on Cybersecurity
Read article
Dec 7, 2021
Why Executives Should Play Cyber War Games
Read article
Dec 2, 2021
Why You Need To Reverse Engineer Malware — And Automate Your Analysis
Read article
Nov 29, 2021
The Emergence of Killware
Read article
Nov 22, 2021
Insider Threats: The Danger Within Your Own Walls
Read article