Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyber Frontlines: Insights from DSEI Japan 2025

Modern conflict is no longer dominated solely by tanks, ships, and fighter jets. The nature of warfare itself has transformed dramatically. Today, battles are increasingly fought—and won—in cyberspace. Historically, military leaders intimately understood their hardware; pilots knew their planes, naval commanders knew their ships, and tank commanders knew their armoured vehicles.

To Grok or Not To Grok: For 29% of Enterprises...There Is No Question

Grok is a chatbot developed by Elon Musk’s xAI. It was initially released to select individuals in November 2023 and became generally available to all X (formerly Twitter) users in December 2024. With the release of Grok-3 in February, Grok’s popularity rose rapidly. However, that rise was short-lived, and its user base in the enterprise has plateaued. At the same time, many organizations took a defensive stance to block the new app pending their own security and AI governance reviews.

Why Architecture Still Wins: Making SASE & SD-WAN Work Without Compromise

The shift to cloud, SaaS, and hybrid work is no longer breaking news. What is surprising is how many IT and network teams are still trying to stitch together architectures that weren’t designed for today’s distributed world. Data is everywhere. Users are everywhere. Applications live across SaaS, public cloud, and private data centers. Yet too often, traditional network and security architectures can’t keep up, creating bottlenecks, security gaps, and user frustration.

Ditch the VPN. Upgrade Your Access with Netskope One Private Access

Old VPNs slow you down, open security gaps, and kill user experience. It’s time for a smarter way to connect — fast, secure, and built for the cloud era. Netskope One Private Access is Zero Trust access without the pain. No tunnels. No guesswork. Just instant access to the apps your users need — from anywhere. What you get: Direct, high-speed access to cloud and legacy apps Zero Trust security with zero VPN credentials to steal Full visibility and control over private app traffic It’s time to rethink remote access.

Glitch-hosted Phishing Uses Telegram & Fake CAPTCHAs to Target Navy Federal Credit Union Customers

From January to April 2025, Netskope Threat Labs tracked a three-fold increase in traffic to phishing pages created on the Glitch platform. These phishing campaigns have affected more than 830 organizations and over 3,000 users since January 2025, primarily targeting Navy Federal Credit Union members and seeking sensitive information.

SSE Leader. Again. Why Netskope Keeps Hitting the Mark.

Today we are thrilled to announce that Netskope has once again been named a Leader in the Gartner Magic Quadrant for Security Service Edge (SSE). This is the fourth year in a row Netskope has been recognized as a Leader, and we have been recognized as a Leader every time since the inaugural 2022 Magic Quadrant for SSE.

Netskope Threat Coverage: Scattered Spider

The adversary group commonly referred to as Scattered Spider is also tracked as UNC3944, Muddled Libra, Octo Tempest, Starfraud, Scatter Swine, 0ktapus, Roasted 0ktapus, and Storm-0875. Active since at least 2022, this financially motivated group has rapidly gained notoriety for its social engineering campaigns and ransomware attacks, which span multiple sectors.

PureHVNC RAT Using Fake High-level Job Offers from Fashion and Beauty Brands

In recent months, the Netskope Threat Labs team has observed several different campaigns delivering the PureHVNC RAT and its plugins. In 2024, the same malware was observed being delivered via a Python chain, and a few days ago, it was also observed using genAI sites to lure victims. In this blog post, we’ll describe an infection chain using different methods to lure the victim and successfully deliver the PureHVNC RAT.

Netskope Deepens Partner Ecosystem with Google's Cloud WAN Integration

Enterprises today operate in a hyper-distributed environment where users, devices, applications, and workloads are no longer confined within traditional corporate boundaries. Whether you’re working with remote employees, branch offices, SaaS, IaaS, or non-human form factors like robots and AI workloads, everything must securely and reliably connect to everything else, along with unified policy enforcement.