Breaking Down CoPhish: How Copilot Studio Became a Phishing Platform
CoPhish turns Microsoft Copilot Studio into an OAuth phishing platform, bypassing MFA and domain filters by delivering token theft through legitimate Microsoft infrastructure.
The State of Ransomware: April 2026
BlackFog's state of ransomware April 2026 measures publicly disclosed and non-disclosed attacks globally.
2026 Q1 Ransomware Report
BlackFog’s 2026 Q1 Ransomware Report - Ransomware Remains Relentless with Data Exfiltration Holding at 96%
Shadow AI and Governance: Why Traditional Control Is Failing CISOs
Shadow AI and Governance: Why traditional controls are failing CISOs as AI adoption accelerates, increasing risk and reducing visibility.
Ransomware in Energy and Utilities: The Real Story Behind the Attacks
Ransomware in energy and utilities is rising, combining disruption, data theft, and extortion across critical infrastructure.
Oracle Breach: What Happened and Why It Matters
The 2025 Oracle breach exposed millions of records across three separate incidents. Learn how attackers got in, which industries were hit, and how to protect your organization.
5 Recent Examples of Security Breach Incidents And What Businesses Must Learn From Them
What can businesses take from five of last year's biggest data breaches to ensure they don't become the next victim?
6 Hidden Consequences Of Data Breach Incidents Businesses Must Prepare For
The consequences of data breach incidents go far beyond immediate financial losses. Make sure you're aware of these six costly ongoing issues.
Key Things Businesses Must Know About Data Breach Compensation
Data breach compensation explained: when customers can claim, the risks to businesses and how to reduce legal exposure.










