We hope that you have had a great start to your 2022. The start of a new year is always exciting and brimming with possibilities: you have new budgets, new plans, new strategies, etc. The same can be true of […]
We hope that you have had a great start to your 2022. The start of a new year is always exciting and brimming with possibilities: you have new budgets, new plans, new strategies, etc. The same can be true of […]
Secure Access Service Edge architecture (SASE) is one of the most discussed subjects in the tech industry. More and more businesses are adopting this framework thanks to the efficiency, control, security and cost reduction that come with it. Answers to […]
Executive Summary The rapid shift to remote work in spring of 2020 presented a fresh opportunity for threat actors to subvert traditional defense-in-depth protections by targeting the weakest points of the new network perimeter — devices which are routinely purchased […]
Based on the latest Cyberthreat Defense Report, over 85% of organizations have been the victim of at least one cyber attack in the last year and over 40% have been breached multiple times. With credential stuffing and account takeover (ATO) […]
Another year has come to a close, and with that it’s time to reflect on 2021. It was a busy year for everyone — especially those who work tirelessly to keep the internet clean. We watched as major attacks took […]
The state of IT modernization in the federal government will always be a work in progress. There will always be new ways we can help agencies use technology to communicate with their stakeholders more effectively. There will always be new […]
It feels like business is starting to get back to normal again, which means more traveling to meet customers face to face. I certainly welcome it. There is no better way to establish or strengthen relationships with customers than listening […]
Executive Summary Last fall, Black Lotus Labs discovered in the wild what had until then only been theorized: Linux binaries were being used as loaders in Windows Subsystem for Linux (WSL). Since our initial report, Black Lotus Labs continues to […]
What Global Network Visibility Reveals about the Resurgence of One of the World’s Most Notorious Botnets Executive Summary Since its reemergence on Nov. 14, 2021, Black Lotus Labs has once again been tracking Emotet, one of the world’s most prolific […]
Keeping up with the latest cybersecurity trends is a continuous journey—because no matter how vigilant a company is or how well they orchestrate their cyber defenses, bad actors are highly motivated to evolve their methods, find new vulnerabilities, and exploit […]