Articles, News and Industry Tips

Read the latest articles on best practices, building customer-centric products, and the latest in cybersecurity.
Filters
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Threat Integrations
Microsoft Defender + Malware Sandbox: A Powerful Security Integration for Automated Threat Response

February 10, 2025

Ransomware
The Silent Breach: Understanding Zero-Day Vulnerabilities

February 5, 2025

Ransomware
Understanding End-of-Life: What You Need to Know

January 27, 2025

Threat Integrations
Transferring Web and Cloud Firewall logs into Enterprise SIEM by using Zscaler’s Nanolog Streaming Service (NSS)

January 6, 2025

Ransomware
RansomHub Revealed: Threats, Tools, and Tactics

December 9, 2024

Ransomware
The Rise of INTERLOCK Ransomware

November 13, 2024

Vulnerability Management
Fortifying the Cloud: A Guide to Securing Vulnerable Cloud Environments

October 23, 2024

Ransomware
The Emergence of Mallox v1.0

September 25, 2024

Ransomware
Vulnerability Management
Network Security
Threat Intelligence
Medusa Ransomware: Evolving Tactics in Modern Cyber Extortion

September 18, 2024

Cloud Security
DevSecOps
Vulnerability Management
Threat Intelligence
Compliance & Risk Management
Akira Ransomware: The Evolution of a Major Threat

September 11, 2024

Ransomware
Threat Intelligence
Network Security
DevSecOps
Open Source Security
Qilin Ransomware

August 28, 2024

Cloud Security
DevSecOps
Open Source Security
Vulnerability Management
Threat Intelligence
New Trojan Malware Exploits Users with Rogue Chrome and Edge Extensions

August 21, 2024

Subscribe to our Newsletter