Los Altos, CA, USA
Mar 22, 2023   |  By Gustavo Palazolo
Emotet is undoubtedly a very resilient botnet. Even though its operation was disrupted by Europol in January 2021, Emotet came back a few months later and continues to spread. In May 2022, shortly after Microsoft released new controls related to malicious macros, Netskope Threat Labs analyzed an Emotet campaign where they were testing a new delivery method, by using LNK files.
Mar 21, 2023   |  By Ray Canzanese
Netskope Threat Labs publishes a monthly summary blog post of the top threats we are tracking on the Netskope platform. The purpose of this post is to provide strategic, actionable intelligence on active threats against enterprise users worldwide.
Mar 21, 2023   |  By Gustavo Palazolo
A now fixed zero-day elevation of privilege (EoP) vulnerability in Microsoft Outlook (CVE-2023-23397) allows attackers to send craft emails to exploit Outlook. The vulnerability does not require user interaction to be exploited and runs even before the email is visualized in the preview pane of Outlook, which makes this vulnerability even more dangerous.
Mar 21, 2023   |  By Robby Coppens
Late last year, the EU Parliament formally adopted a new Directive, NIS2, updating and superseding the existing NIS Directive which helped the organisations responsible for Europe’s critical national infrastructure to better understand, manage, and reduce their cybersecurity risk.
Mar 20, 2023   |  By Sean Salomon
The Netskope Security team is happy to announce the official release of our newest Cloud Threat Exchange plugin built in-house, which now allows users to pull threat data discovered by SecLytics. This integration leverages the SecLytics Bulk API to allow users to pull identified URL, IP, and CIDR block indicators of behavior (IoBs) into Cloud Exchange.
Mar 16, 2023   |  By Gustavo Palazolo
BlackSnake is a ransomware-as-a-service (RaaS) group that first appeared in a hacking forum in August 2022, where the operators were seeking affiliates and stating that they would take 15% of the profit, which is below the typical average of 20-30%. On February 28, 2023, a new variant of BlackSnake was spotted, and is notable for having a clipper module that targets cryptocurrency users.
Mar 15, 2023   |  By Carmine Clementelli
Today, Netskope partnered with the Cloud Security Alliance to release the Data Loss Prevention (DLP) and Data Security Survey Report, a survey focused on data protection needs in cloud and hybrid work environments. Unsurprisingly, the report found that the biggest pain point organizations identify with trying to modernize their data protection strategy is that current DLP deployments show limitations when it comes to cloud and remote work use cases, and they are a nightmare to manage.
Mar 14, 2023   |  By Paolo Passeri
Another day, another cyber espionage campaign exploiting two legitimate and well-known cloud services to deliver the malicious payload. Once again, this campaign was unearthed by researchers at Sentinel One, and it is aimed to distribute the Remcos Remote Access Tool (yet another example of a remote control tool used for malicious purposes) through the DBatLoader to target predominantly organizations in Eastern Europe.
Mar 14, 2023   |  By Neil Thacker
Innovation and regulation are two important factors that have a significant impact on the growth of any industry, including information security. The question of whether regulation inhibits or inspires innovation is a contentious one, and there are compelling arguments on both sides.
Mar 10, 2023   |  By David Willis
When I talk to customers and partners about Cloud Threat Exchange (CTE), I immediately say, “I’m not in marketing, and didn’t see the future—so I misnamed the module. I should have named it Cloud Data Exchange.” Why do I say this? Because, as Netskope and Cloud Exchange have matured, the number of use cases the module can fulfill has naturally grown beyond the initial vision. How so?
Jan 5, 2023   |  By Netskope
Netskope IoT Security uncovers managed and unmanaged connected devices on both the radio and network spectrum and generates deep device-level contextual intelligence for device classification, asset management, dynamic risk assessment, segmentation, and access control, mitigating IoT-related threats and addressing the hidden attack surface created by the connected devices.
Dec 8, 2022   |  By Netskope
Consistent Performance, Security and One Policy Secure, reliable connectivity for every site, cloud, remote user, or IoT device so customers can benefit from a truly converged SASE platform that simplifies operations and preserves network performance.
Nov 29, 2022   |  By Netskope
This video provides a brief introduction to Netskope Private Access and automation including an overview of the REST API and Terraform.
Nov 29, 2022   |  By Netskope
With Netskope’s pioneering solutions, PeopleStrong is able to provide strong security for customers’ data while also complying with the strongest norms.
Nov 10, 2022   |  By Netskope
Yes, legacy DLP produces too many false positives and can be very disruptive and impact productivity because it is unaware of risks and user behavior. Can modern DLP be aware of risks and context? In this Ask SME Anything we find out.
Oct 20, 2022   |  By Netskope
What is Security Service Edge (SSE)? Why are legacy security architectures no longer effective? Clear up the confusion and learn about this emerging category that helps improve user experience and security with help from Netskope's Vice President and Chief Evangelist, Bob Gilbert. Intelligent SSE from Netskope is redefining cloud, network, data security.
Oct 18, 2022   |  By Netskope
Enabled by Netskope, Dartmouth College is able to better use existing functionalities to manage its security infrastructure more effectively, thereby reducing friction and enhancing its security posture.
Oct 14, 2022   |  By Netskope
Learn how Netskope enables the team at Dartmouth to pull in intelligence for multiple sources and synthesize that into meaningful results, right down to the actions they should take.
Sep 20, 2022   |  By Netskope
Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data. The Netskope Intelligent Security Service Edge (SSE) platform is fast, easy to use, and secures people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers, including more than 25 of the Fortune 100, trust Netskope and its powerful NewEdge network to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements.
Sep 16, 2022   |  By Netskope
What is Zero Trust? Clear up the confusion about Zero Trust with help from Netskope's field CTO and former Gartner Analyst, Steve Riley.
Jan 16, 2022   |  By Netskope
Grab your copy of the first ever book on SSE Security Service Edge (SSE) is described by Gartner as the security stack of services within a SASE architecture. SSE is fast, easy to use, and secures your business wherever your people and data go. In this book, you'll: Download the very first SSE For Dummies book on the market where we cut through the acronyms to give you a functional understanding of how this set of tools will impact your security going forward.
Feb 21, 2019   |  By Netskope
Google Cloud Platform (GCP) provides a great way to save money and move faster. But administrators aren't often aware of the best security practices and controls to implement. How do you move to GCP efficiently without increasing the risk of a security breach? Read this new whitepaper to help your organization avoid common mistakes.
Oct 9, 2018   |  By Netskope
As you evaluate cloud access security brokers (CASBs) to safely enable sanctioned and unsanctioned (shadow IT) cloud services, cloud DLP is an important component of the solution. This 6-question checklist will give you specific, use case-based examples to help you di_x001F_fferentiate between CASBs and choose the right one for your organization.
Oct 6, 2018   |  By Netskope
To achieve business goals, business leaders are choosing to work with multiple cloud providers, embracing di_x001F_erent clouds optimized for various services. By distributing workloads and mitigating risk, a multi-cloud approach is increasingly recognized as a good strategy for organizations that want to maximize the bene_x001E_its of the cloud and also easily adapt to changing business needs. In this eBook, we focus on _x001E_ive common questions about multi-cloud.
Aug 29, 2018   |  By Netskope
While AWS manages security of the cloud, security in the cloud is the responsibility of the customer. Security teams need to understand their part in the shared responsibility model, where customers retain control of what security they choose to implement to protect their own content, platform, applications, systems, and networks, no differently than they would for applications in an onsite data center.
Aug 1, 2018   |  By Netskope
In this white paper, we'll share the behavior of malware infections by exploring the relationships between cloud application users and their files residing in the cloud. Netskope has observed such user-file relationships in cloud applications such as Google Drive, Dropbox, AWS, etc. in customer environments.
Apr 12, 2018   |  By Netskope
How to deliver AWS security that guards data everywhere and stops elusive attacks. This eBook contains 5 steps you can follow to boost your AWS security posture and shows how Netskope can help you implement them.
Mar 26, 2018   |  By Netskope
Everything is moving to the cloud. Certainly your apps are, with well over a thousand cloud apps in the average enterprise today. Your infrastructure is moving to the cloud too, with IaaS services such as AWS and Azure growing at a rapid pace. Most importantly, your critical data is moving to the cloud.
Mar 26, 2018   |  By Netskope
The way people work has changed. Driven by the increasing use of cloud services and mobile devices, people now expect to be able to work at any time, from any place, and on any device. These changes are dramatically altering the network and security infrastructure in many organizations.
Dec 4, 2017   |  By Netskope
Traditional security providers lack capabilities to address today's critical use cases. This eBook discusses seven of these gaps and how you can address them.

Netskope is the leader in cloud security.

We help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our patented Cloud XD technology targets and controls activities across any cloud service or website and customers get 360-degree data and threat protection that works everywhere. We call this smart cloud security.

Unique Capabilities:

  • Eliminate Blind Spots: Patented and built in the cloud, Netskope Cloud XD™ understands SaaS, IaaS, and web in extreme definition and performs big data analytics in real time. This eliminates the blind spots across thousands of SaaS and IaaS services, and millions of websites.
  • Guard Data Everywhere: Award-winning 360º data protection guards sensitive data everywhere through advanced cloud DLP and encryption across SaaS, IaaS, and web. Built in the cloud, Netskope works regardless of location or device and handles the direct-to-cloud and direct-to-web traffic that others miss.
  • Stop Elusive Attacks: Only Netskope advanced threat protection stops elusive attacks across SaaS, IaaS, and web. Built in the cloud with real-time and deep detection engines, Netskope finds malware and ransomware that evade legacy tools when they traverse both cloud and web to inflict damage.
  • Full Control, One Cloud: The industry’s only SaaS, IaaS, and web security platform built from the start in one cloud. Unlike other tools, Netskope eliminates policy conflict through standardized categories across SaaS, IaaS and web. Built in the cloud, Netskope scales automatically to meet your needs.

It’s time for smart cloud security.