Articles, News and Industry Tips

Read the latest articles on best practices, building customer-centric products, and the latest in cybersecurity.
Filters
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Ransomware
Black Basta Exposed: Anatomy of a Relentless Ransomware Threat

March 19, 2025

Threat Integrations
Leaked Credentials Entra ID Integration Application Overview

March 6, 2025

Compliance & Risk Management
Strengthening Cyber Resilience with Attack Surface Management

March 5, 2025

Ransomware
XCSSET Reloaded: Smarter, Stealthier, Stronger

February 20, 2025

Software Supply Chain Security
Securing the Open-Source Frontier: Understanding Supply Chain Attacks

February 13, 2025

Ransomware
Unraveling Lynx Ransomware

February 12, 2025

Threat Integrations
Microsoft Defender + Malware Sandbox: A Powerful Security Integration for Automated Threat Response

February 10, 2025

Ransomware
The Silent Breach: Understanding Zero-Day Vulnerabilities

February 5, 2025

Ransomware
Understanding End-of-Life: What You Need to Know

January 27, 2025

Threat Integrations
Transferring Web and Cloud Firewall logs into Enterprise SIEM by using Zscaler’s Nanolog Streaming Service (NSS)

January 6, 2025

Ransomware
RansomHub Revealed: Threats, Tools, and Tactics

December 9, 2024

Ransomware
The Rise of INTERLOCK Ransomware

November 13, 2024

Sign up to our Newsletter