Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DeepSeek Deception: Sainbox RAT & Hidden Rootkit Delivery

Netskope Threat Labs has discovered a campaign using fake installers to deliver the Sainbox RAT and Hidden rootkit. During our threat hunting activities, we encountered multiple installers disguised as legitimate software, including WPS Office, Sogou, and DeepSeek. These installers were mainly MSI files that were delivered via phishing websites. Both the phishing pages and installers were in Chinese, indicating that the targets are Chinese speakers.

The Power of Patents as Netskope "Customer Zero"

As Netskope approaches the 300 patent milestone, I sat down for a quick chat with our CISO James Robinson to hear about the most recent patent granted to his team, find out why he sees patents as being so important, and discover what they tell us about the way his team—the team in charge of cybersecurity at a cybersecurity company—innovates.

Accelerate Intelligence with Automated & Unified Data Security

When it comes to data security, you want it to be accurate, reliable, thorough, and fast. Ideally, faster today than it was yesterday, and faster tomorrow than it was today, to address increasing data security needs in the same amount of time or less. We’re seeing a growing prevalence of employees using unmanaged devices, handling sensitive organizational structured and unstructured data, and accessing managed and unmanaged apps with those devices and that data.

Planning for a Post-quantum World, Now!

One of the primary concerns occupying future-gazers within the technology industry is the impact that quantum advances will have upon established encryption methods. Quantum computing is advancing at pace, and alongside the enthusiasm for what that will enable is a practical concern for the way quantum processing might render some of today’s security approaches ineffective.

Beyond VPNs: Secure Remote Access for OT & IIoT

Everybody loves a good throwback. Flip phones, vinyl records, and maybe even the dial-up tone for nostalgia’s sake. But if your operational technology (OT) and industrial internet of things (IIoT) environment is still relying on traditional VPNs to connect users, vendors, and machines, that’s one throwback you really don’t want. OT systems have evolved. They’re smarter, more connected, and unfortunately more vulnerable than ever.

Cyber Frontlines: Insights from DSEI Japan 2025

Modern conflict is no longer dominated solely by tanks, ships, and fighter jets. The nature of warfare itself has transformed dramatically. Today, battles are increasingly fought—and won—in cyberspace. Historically, military leaders intimately understood their hardware; pilots knew their planes, naval commanders knew their ships, and tank commanders knew their armoured vehicles.

To Grok or Not To Grok: For 29% of Enterprises...There Is No Question

Grok is a chatbot developed by Elon Musk’s xAI. It was initially released to select individuals in November 2023 and became generally available to all X (formerly Twitter) users in December 2024. With the release of Grok-3 in February, Grok’s popularity rose rapidly. However, that rise was short-lived, and its user base in the enterprise has plateaued. At the same time, many organizations took a defensive stance to block the new app pending their own security and AI governance reviews.

Why Architecture Still Wins: Making SASE & SD-WAN Work Without Compromise

The shift to cloud, SaaS, and hybrid work is no longer breaking news. What is surprising is how many IT and network teams are still trying to stitch together architectures that weren’t designed for today’s distributed world. Data is everywhere. Users are everywhere. Applications live across SaaS, public cloud, and private data centers. Yet too often, traditional network and security architectures can’t keep up, creating bottlenecks, security gaps, and user frustration.

Ditch the VPN. Upgrade Your Access with Netskope One Private Access

Old VPNs slow you down, open security gaps, and kill user experience. It’s time for a smarter way to connect — fast, secure, and built for the cloud era. Netskope One Private Access is Zero Trust access without the pain. No tunnels. No guesswork. Just instant access to the apps your users need — from anywhere. What you get: Direct, high-speed access to cloud and legacy apps Zero Trust security with zero VPN credentials to steal Full visibility and control over private app traffic It’s time to rethink remote access.

Glitch-hosted Phishing Uses Telegram & Fake CAPTCHAs to Target Navy Federal Credit Union Customers

From January to April 2025, Netskope Threat Labs tracked a three-fold increase in traffic to phishing pages created on the Glitch platform. These phishing campaigns have affected more than 830 organizations and over 3,000 users since January 2025, primarily targeting Navy Federal Credit Union members and seeking sensitive information.