• April 28 2026

    Oracle Breach: What Happened and Why It Matters

    The 2025 Oracle breach exposed millions of records across three separate incidents. Learn how attackers got in, which industries were hit, and how to protect your organization.

  • March 31 2026

    Venom Stealer Turns ClickFix Into a Full Exfiltration Pipeline

    BlackFog analyzes Venom Stealer, a new MaaS infostealer that uses ClickFix delivery to launch an automated exfiltration pipeline covering credential theft, wallet cracking, and fund sweeping.

  • March 15 2026

    LotAI: How Attackers Weaponize AI Assistants for Data Exfiltration

    What happens when attackers use your approved AI tools as a data exfiltration channel? New research reveals how the LotAI technique turns Copilot and Grok into covert C2 relays.

  • February 25 2026

    Steaelite RAT Enables Double Extortion Attacks from a Single Panel

    Steaelite is a newly emerging RAT that unifies credential theft, data exfiltration, and ransomware in a single web panel, accelerating double extortion attacks.

  • January 29 2026

    Lotus C2 – A New C2 Framework Sold as a Cybercrime Kit

    Learn how Lotus C2 enables credential theft, data exfiltration, and mass attacks, blurring red team and cybercrime lines.

  • November 25 2025

    GTG 1002: Claude Hijacked For The First AI Led Cyberattack

    Anthropic’s Claude was manipulated into a cyber espionage campaign. See how it happened, why it matters, and how ADX can block machine-speed data theft.

  • November 20 2025

    New Matrix Push C2 Abuses Push Notifications to Deliver Malware

    Investigating Matrix Push C2, a browser based command and control system that uses push notifications to deliver malware, run phishing campaigns, and steal data across platforms.

  • November 19 2025

    Clop’s New Extortion Wave Hits Oracle E-Business Suite

    Clop exploited an Oracle E-Business Suite zero-day to steal data from major organizations. Here’s how it happened and what it means for supply-chain security.

  • June 27 2025

    Microsegmentation: Strengthening Network Security Against Zero Day Exploits

    Find out why microsegmentation is an increasingly popular option for supporting zero trust networking approaches.

  • June 27 2025

    Patch Management: An Essential Part of Data Security

    Ensuring you have a strong patch management strategy in place is essential in minimizing the risks posed by known vulnerabilities.

  • June 27 2025

    Zero Day Security Exploits: How They Work and How to Stay Safe

    Learn about the risk posed by zero day security exploits and what firms can do to minimize their exposure to these issues.

  • June 16 2025

    Data Splicing vs. Traditional DLP: The New Threat for Enterprises

    Explore how data splicing attacks bypass traditional DLP solutions and why ADX, with its real-time endpoint monitoring and AI based threat analysis, offers a powerful defense against advanced data exfiltration techniques.