The Void: A New MaaS Infostealer Targeting 20+ Browsers
Find out how Model Context Protocol (MCP) could be abused as a covert channel for data theft: five real risks, examples, and mitigations.
Find out how Model Context Protocol (MCP) could be abused as a covert channel for data theft: five real risks, examples, and mitigations.
BlackFog’s 2025 Q4 Ransomware Report - The Unrelenting Surge: Ransomware Closes Q4 at Record Levels
Learn how DNS exfiltration works and why this method of data theft often goes undetected.
Shadow AI is expanding the enterprise attack surface. Learn how unsanctioned AI use drives data leakage risks and why real-time prevention is needed.
BlackFog's state of ransomware 2025 report measures publicly disclosed and non-disclosed attacks globally.
Ransomware gangs continue to break records and BlackFog will track all new ransomware gangs in 2024.
BlackFog's state of ransomware December 2025 measures publicly disclosed and non-disclosed attacks globally.
Rhysida ransomware is ramping up U.S. attacks in 2025 across healthcare, finance, and manufacturing. See recent breaches, tactics, and a CISA-aligned mitigation playbook.
The FBI has issued a warning about AI voice phishing scams using deepfake audio and text messages. Learn how these attacks work, who’s at risk, and how to stay protected.
Akira is ransomware targeting infrastructure and endpoints at scale. BlackFog counters it with monitoring and exfiltration prevention.
BlackFog's state of ransomware November 2025 measures publicly disclosed and non-disclosed attacks globally.
Anthropic’s Claude was manipulated into a cyber espionage campaign. See how it happened, why it matters, and how ADX can block machine-speed data theft.