Summary Gamers are a hot target for infostealers these days. This blog post is the second we have published this month about an infostealer targeting gamers, with the previous one describing a Python-based malware targeting Discord. This blog post focuses on RedTiger, a red-teaming tool from which we have seen multiple payloads circulating in the […]| Netskope
Summary During threat hunting activities, Netskope discovered a new, multi-function Python RAT that leverages the Telegram Bot API as a command and| Netskope
Is your CIO/CEO misaligned on AI & SASE strategy? Uncover the crucial conversations needed to drive business success & innovation now.| Netskope
In today’s dynamic, hyper-distributed enterprise, with users and devices everywhere, legacy access is showing its cracks. The old rules of engagement, and the tools built to enforce them, simply can’t keep pace. With a hybrid workforce and a surge in IoT devices, now we face users talking to machines and machines talking to machines, all […]| Netskope
Introduction In early 2025, LummaStealer was in widespread use by cybercriminals targeting victims throughout the world in multiple industry verticals, including telecom, healthcare, banking, and marketing. A sweeping law enforcement operation in May brought this all to an abrupt halt. After a quiet period, we are now starting to see new variants of Lumma Stealer […]| Netskope
Summary In the first two parts (1, 2) of this series, we broke down how the Model Context Protocol (MCP) works and explored attacks like tool poisoning and cross-server tool shadowing. In this post, we turn to two of the most subtle and dangerous risks facing MCP-enabled environments: Both techniques demonstrate a hard truth: LLMs […]| Netskope
Today, as Netskope becomes a publicly traded company (NASDAQ: NTSK), we are re-sharing the founder’s letter from CEO and Co-Founder Sanjay Beri. In 2012, I saw the future unfolding before my eyes: a digital cloud-driven world exploding with possibilities, yet teetering on the brink of chaos – an unsecured, wild west environment defined by escalating […]| Netskope
In today’s climate, where every company is a technology company, there is a simple truth many still overlook: CIOs and CISOs can no longer afford to see themselves primarily as technologists or risk gatekeepers. The mandate is clear: They must be business leaders first, using technology and cybersecurity expertise as powerful tools to drive growth, trust, […]| Netskope
Summary In Part 1 of this blog series, we explored the architecture, capabilities, and risks of the Model Context Protocol (MCP). In this post, we will focus on two attack vectors in the MCP ecosystem: prompt injection via tool definitions and cross-server tool shadowing. Both exploit how LLMs trust and internalize tool metadata and responses, […]| Netskope
This is a follow up to the blog Cybersecurity as a Business Enabler about the shifting cybersecurity from a cost center to a value driver. If you are a C-level executive looking to transform how your organization approaches cybersecurity, here is how to shift the mindset from viewing security as just another cost center to […]| Netskope
In today’s fast-moving digital world, cybersecurity is no longer just an IT concern: it is a business imperative, and a game-changer. For many years,| Netskope
Secure and accelerate your cloud, data, and AI everywhere. Achieve unified visibility, advanced SASE & SSE protection, and optimized performance| Netskope
Summary On February 12, 2025, Netskope Threat Labs reported a widespread phishing campaign using fake CAPTCHA images via Webflow CDN to trick victims| Netskope
Gain insights into the risks organizations face when adopting generative AI Apps like ChatGPT. Learn how they mitigate the risks to safely and securely enable AI.| Netskope
Learn more about SaaS Security Posture Management (SSPM), a category of tools that assess and manage the security of cloud-based SaaS applications.| Netskope