Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Egnyte's Journey to FedRAMP Compliance and Beyond

Egnyte’s core values have always included trust, security, and enablement of business agility for customers who work in data-intensive and highly regulated industries. In turn, our cybersecurity program has always been aligned with those values, resulting in Egnyte’s maintenance and continuous expansion of our portfolio of industry-specific compliance certifications.

Threat Actor Profile: Interlock Ransomware

A relatively new ransomware group, Interlock, has gained traction in 2025 as an opportunistic ransomware operator that leverages compromised websites and multi-stage social engineering techniques to deliver their payloads. First observed in September 2024, Interlock departs from the traditional Ransomware-as-a-Service (RaaS) model, operating without affiliates or public advertisements.

Hackers Hate This: The New Playbook for Retail Threat Defence

Retailers are facing increasingly targeted, financially driven cyberattacks, from ransomware to supply chain compromise. Yet many remain reactive. Threat intelligence changes the game, enabling earlier detection, faster response, and deeper risk visibility. Our latest CYJAX whitepaper explores the retail sector’s biggest cyber challenges, the value of intelligence-led security, and practical steps to build resilience.

Beyond the Inbox: How Old-School Mail Scams Are Still Stealing Your Money

In a world so full of digital online scams, it’s hard to remember that scammers abuse our postal mailing systems as well. Scams are as old as humanity. And most of the scams we see today on the internet have been occurring for decades or even centuries before the internet was the internet. Nigerian scams have been documented back to the 1700s.

Alert: Tech Support Scammers Send Phony Podcast Invites

The Better Business Bureau (BBB) has warned that scammers are targeting high-profile employees and influencers with fake invitations to appear as a guest on popular celebrity podcasts. The scammer poses as the podcast’s production manager, offering the target $2,000 for the appearance. If the victim agrees, the attacker will ask them to hop into a virtual meeting to test their setup before the podcast.

The Hallucinated Package Attack: Slopsquatting

Imagine a world where, in the middle of programming, your helpful AI assistant tells you to import a package called securehashlib. It sounds real. It looks real. You trust your silicon co-pilot. You run pip install securehashlib. Congratulations. You’ve just opened a backdoor into your software stack—and possibly your company’s infrastructure. The package didn’t exist until yesterday, when an attacker registered it based on a hallucination the AI made last week.

Top 25 Web Application Firewalls (WAFs) of 2026: Cloudflare Alternatives, Features & Pricing

In today’s hyper-connected world, Web Application Firewalls (WAFs) have become one of the most critical layers in a modern security stack. As businesses shift more operations, data, and user experiences online, web apps and APIs are increasingly under siege – from basic bot scraping to sophisticated logic abuse and zero-day exploits.

Cybersecurity as a Business Enabler

In today’s fast-moving digital world, cybersecurity is no longer just an IT concern: it is a business imperative, and a game-changer. For many years, cybersecurity was perceived as a necessary expense, a cost center that consumed expensive resources mainly to mitigate risks and to prevent threats. But leading organizations now realize that strong cybersecurity is not just about protection, but it is a real driver of growth, customer trust, and competitive advantage.

What's New with Keeper | August 2025

Keeper’s latest update to One-Time Share enables two-way sharing between Keeper users and non-users, providing an easy and secure way to exchange confidential information and files. Upon creating a One-Time Share link, simply check “Allow recipient to edit record fields and upload files” to activate the bidirectional functionality of the One-Time Share link. Once received, the recipient can upload file attachments and enter any other requested information or notes.