• March 31 2026

    Venom Stealer Turns ClickFix Into a Full Exfiltration Pipeline

    BlackFog analyzes Venom Stealer, a new MaaS infostealer that uses ClickFix delivery to launch an automated exfiltration pipeline covering credential theft, wallet cracking, and fund sweeping.

  • March 15 2026

    LotAI: How Attackers Weaponize AI Assistants for Data Exfiltration

    What happens when attackers use your approved AI tools as a data exfiltration channel? New research reveals how the LotAI technique turns Copilot and Grok into covert C2 relays.

  • February 25 2026

    Steaelite RAT Enables Double Extortion Attacks from a Single Panel

    Steaelite is a newly emerging RAT that unifies credential theft, data exfiltration, and ransomware in a single web panel, accelerating double extortion attacks.

  • January 29 2026

    Lotus C2 – A New C2 Framework Sold as a Cybercrime Kit

    Learn how Lotus C2 enables credential theft, data exfiltration, and mass attacks, blurring red team and cybercrime lines.

  • November 25 2025

    GTG 1002: Claude Hijacked For The First AI Led Cyberattack

    Anthropic’s Claude was manipulated into a cyber espionage campaign. See how it happened, why it matters, and how ADX can block machine-speed data theft.

  • November 20 2025

    New Matrix Push C2 Abuses Push Notifications to Deliver Malware

    Investigating Matrix Push C2, a browser based command and control system that uses push notifications to deliver malware, run phishing campaigns, and steal data across platforms.

  • November 19 2025

    Clop’s New Extortion Wave Hits Oracle E-Business Suite

    Clop exploited an Oracle E-Business Suite zero-day to steal data from major organizations. Here’s how it happened and what it means for supply-chain security.

  • June 27 2025

    Microsegmentation: Strengthening Network Security Against Zero Day Exploits

    Find out why microsegmentation is an increasingly popular option for supporting zero trust networking approaches.

  • June 27 2025

    Patch Management: An Essential Part of Data Security

    Ensuring you have a strong patch management strategy in place is essential in minimizing the risks posed by known vulnerabilities.

  • June 27 2025

    Zero Day Security Exploits: How They Work and How to Stay Safe

    Learn about the risk posed by zero day security exploits and what firms can do to minimize their exposure to these issues.

  • June 16 2025

    Data Splicing vs. Traditional DLP: The New Threat for Enterprises

    Explore how data splicing attacks bypass traditional DLP solutions and why ADX, with its real-time endpoint monitoring and AI based threat analysis, offers a powerful defense against advanced data exfiltration techniques.

  • April 25 2025

    Fast Flux Attacks Explained and How to Prevent Data Exfiltration

    Find out how "fast fluxing," a technique used by cybercriminals and rogue nations to hide their online actions, poses a risk to national security and how BlackFog's technology stops sensitive data from being stolen.