
Learning from the EchoLeak Wake-Up Call

Corey Kiesewetter
July 18, 2025

Navigating VUCA: What Gartner® Says About the 2025–2026 Threat Landscape

Lionel Menchaca
July 14, 2025

X-Labs
The New Face of Remcos: Path Bypass and Masquerading

Mayur Sewani
June 25, 2025

From Discovery to Defense: Scaling Data Security with AI

Neeraj Nayak
June 16, 2025

X-Labs
Unmasking the Lumma Stealer Campaign


Jyotika Singh & Prashant Kumar
May 7, 2025

X-Labs
FormBook Malware Distributed via Horus Protector Using Word Docs


Lydia McElligott & Prashant Kumar
April 28, 2025

X-Labs
The Return of Pharmacy-Themed Spam

Hassan Faizan
April 25, 2025

X-Labs
An Old Vector for New Attacks: How Obfuscated SVG Files Redirect Victims

Ben Gibney
April 2, 2025

X-Labs
Protecting the Crown Jewels: How DSPM and DDR Defends Red Teaming

Z. G.
March 17, 2025

