Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Undercover Investigations: How AI is Supercharging Romance Scams

As someone that’s been in the industry for over 20 years, I’ve seen my fair share of online scams. But this is the kind of story you hear and can’t quite believe. At the last RSA cybersecurity conference, a colleague of mine–someone who lives and breathes digital security, a CISO–admitted he’d been taken in by an online romance scam. My first thought was, how?

What SASE Got Right and What It Missed: Architecture and Implementation Matters

SASE has transformed how organizations approach secure networking, uniting security and connectivity into a single, cloud-delivered model. As one of the original architects of SASE (along with Neil MacDonald), I was invited at ONUG Dallas to reflect on the state of SASE and what we might have missed in our original research.

XWorm V6: Advanced Evasion and AMSI Bypass Capabilities Revealed

In September 2024, Netskope Threat Labs reported on the XWorm malware and its infection chain. We revealed new XWorm command and control (C2) commands and dissected its notable features. After nearly a year of tracking this malware, we discovered a new version (version 6.0) in the wild, which introduced new features such as process protection and enhanced anti-analysis capabilities.

How Netskope's Log Streaming Supercharges Your SOC

In today’s cloud-first world, security teams need real-time, actionable visibility into user activity and threats across the web, cloud, and private apps. The newly announced Netskope Log Streaming delivers just that. Netskope’s Log Streaming solution delivers significant value by providing real-time access to all Netskope-generated security logs directly into customers’ preferred cloud storage and last mile security information and event management (SIEM) tools.

Netskope Expands Technology Partner Ecosystem with New Integrations

At Netskope, we are relentlessly focused on empowering our customers to stay ahead of the curve in the face of the increasingly dynamic threat landscape. We’re thrilled to announce the expansion of our technology partner ecosystem through innovative new integrations. These strategic alliances with industry-leading companies are designed to deliver even more comprehensive protection and unparalleled visibility across your critical cloud environments. These new integration areas include.

Netskope's 20/20 Vision and Recognition as a SASE Leader

Netskope has been named a Leader in the 2025 Gartner Magic QuadrantTM for SASE Platforms. This is the second successive year, and we are now positioned furthest in vision in the Gartner Magic QuadrantTM reports for BOTH SASE Platforms and SSE. That’s what we, at Netskope, call “20/20 Vision.” In this year’s 2025 Critical Capabilities for SASE Platforms report, Gartner defined four key Use Cases.

Are Your VPNs and NACs Secretly Sabotaging Your Security?

For many, the answer still involves legacy VPNs and Network Access Control (NAC), familiar tools from a different era. But what if those trusted systems aren’t protecting you anymore, and are instead becoming some of your biggest liabilities? To explore this shift, Netskope partnered with Cybersecurity Insiders, a leading research platform for CISOs and cybersecurity professionals, to dig into the real risks of relying on outdated access solutions.

DeepSeek Deception: Sainbox RAT & Hidden Rootkit Delivery

Netskope Threat Labs has discovered a campaign using fake installers to deliver the Sainbox RAT and Hidden rootkit. During our threat hunting activities, we encountered multiple installers disguised as legitimate software, including WPS Office, Sogou, and DeepSeek. These installers were mainly MSI files that were delivered via phishing websites. Both the phishing pages and installers were in Chinese, indicating that the targets are Chinese speakers.

The Power of Patents as Netskope "Customer Zero"

As Netskope approaches the 300 patent milestone, I sat down for a quick chat with our CISO James Robinson to hear about the most recent patent granted to his team, find out why he sees patents as being so important, and discover what they tell us about the way his team—the team in charge of cybersecurity at a cybersecurity company—innovates.