Companies must be capable of detecting malicious DLLs and vulnerabilities in software libraries to prevent early-stage compromise, says Andrzej Jarmolowicz, operations director at Cybershure.
Timeline
2025
December
- 3.
November
- 5. Shadow IT comprises tools, scripts and applications deployed without formal IT approval, says Andrzej Jarmolowicz, operations director at Cybershure.
October
- 1. To counter threats like Charon, companies must move beyond reactive patching and adopt continuous threat exposure management, says Andrzej Jarmolowicz, operations director at Cybershure.
September
- 9. CTEM continuously detects, prioritises, validates and remedies security exposures in real-time, says Andrzej Jarmolowicz, operations director at Cybershure.
February
- 19. CyberCyte’s MDR platform focuses on threat hunting and asset attack surface management to identify vulnerabilities and potential risks.
- 13. Labyrinth Security Solutions specialises in cyber deception technology.

