Prompt Poaching: How Fake ChatGPT Extensions Stole 900k Users’ Data
Two fake AI extensions hit 900k Chrome users, stealing chats, code and data – a stark example of Prompt Poaching.
Lotus C2 – A New C2 Framework Sold as a Cybercrime Kit
Learn how Lotus C2 enables credential theft, data exfiltration, and mass attacks, blurring red team and cybercrime lines.
The Void: A New MaaS Infostealer Targeting 20+ Browsers
Find out how Model Context Protocol (MCP) could be abused as a covert channel for data theft: five real risks, examples, and mitigations.
2025 Q4 Ransomware Report
BlackFog’s 2025 Q4 Ransomware Report - The Unrelenting Surge: Ransomware Closes Q4 at Record Levels
Data Breach Prevention: Practical Ways To Stop Data Loss
Data breaches are costly cyberthreats. Learn how data breach prevention strategies reduce risk and stop the most common causes in our guide.
How A Clear Data Loss Prevention Policy Reduces Risk
Find out what's needed to create a strong data loss prevention policy and why this matters in a complex environment.
Getting A Data Loss Prevention Strategy Right
A strong data loss prevention strategy can be the difference between stopping a potential breach early or a costly mistake. Here's what firms need to know when creating one.
How MCP Could Become a Covert Channel for Data Theft
Find out how Model Context Protocol (MCP) could be abused as a covert channel for data theft: five real risks, examples, and mitigations.
Why do Businesses Need Advanced Enterprise DLP Solutions?
Enterprise DLP systems play a key role in protecting businesses from both deliberate cyberattacks and accidental data breaches. Here's why all firms need one.










