Articles, News and Industry Tips

Read the latest articles on best practices, building customer-centric products, and the latest in cybersecurity.
Filters
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Ransomware
XCSSET Reloaded: Smarter, Stealthier, Stronger

February 20, 2025

Software Supply Chain Security
Securing the Open-Source Frontier: Understanding Supply Chain Attacks

February 13, 2025

Ransomware
Unraveling Lynx Ransomware

February 12, 2025

Threat Integrations
Microsoft Defender + Malware Sandbox: A Powerful Security Integration for Automated Threat Response

February 10, 2025

Ransomware
The Silent Breach: Understanding Zero-Day Vulnerabilities

February 5, 2025

Ransomware
Understanding End-of-Life: What You Need to Know

January 27, 2025

Threat Integrations
Transferring Web and Cloud Firewall logs into Enterprise SIEM by using Zscaler’s Nanolog Streaming Service (NSS)

January 6, 2025

Ransomware
RansomHub Revealed: Threats, Tools, and Tactics

December 9, 2024

Ransomware
The Rise of INTERLOCK Ransomware

November 13, 2024

Vulnerability Management
Fortifying the Cloud: A Guide to Securing Vulnerable Cloud Environments

October 23, 2024

Ransomware
The Emergence of Mallox v1.0

September 25, 2024

Ransomware
Vulnerability Management
Network Security
Threat Intelligence
Medusa Ransomware: Evolving Tactics in Modern Cyber Extortion

September 18, 2024

Sign up to our Newsletter