Analysis of the 2025 Salesforce breach wave at Google, Workday, and Salesloft, highlighting SaaS risk, identity abuse, and data exfiltration.| BlackFog
Find out why businesses should be considering AI endpoint security solutions and what benefits can these offer over legacy EDR tools.| BlackFog
Discover why large organizations need scalable, adaptive enterprise endpoint security solutions that protect diverse devices and environments.| BlackFog
Understanding the difference between EDR vs XDR is essential when determining which endpoint security solutions are best for your business.| BlackFog
Endpoint management plays a vital role in protecting businesses from inbound threats and data loss. Learn best practices to secure devices.| BlackFog
What should firms look for when considering a modern, AI-assisted intrusion prevention systems?| BlackFog
Learn everything you need to know about the various types of endpoint security solutions and key features you need to boost your cybersecurity.| BlackFog
In September 2025, Collins Aerospace was hit by ransomware, disrupting check-in at European airports with delays, cancellations, and manual operations.| BlackFog
Infostealers compromise credentials and open the door to ransomware. Learn what they are, how they work, and key steps to keep your business safe.| BlackFog
Data poisoning corrupts the information resources that AI systems rely on. Learn how this growing threat works, why it matters and what steps your business can take to defend against it.| BlackFog
Discover why cyber resiliency is vital in 2025 as firms face complex threats. Learn how businesses can adapt, recover and protect trust.| BlackFog
Interlock ransomware is disrupting healthcare, cities, and infrastructure in 2025 with fake update lures, data theft, and double extortion tactics.| BlackFog
BlackFog provides AI based ransomware prevention using anti data exfiltration (ADX).| BlackFog
Scattered Spider, Lapsus$, and ShinyHunters form new cybercrime alliance. Here is everything defenders need to know.| BlackFog
Do you know how to prevent ransomware? Here are a few key best practices every business should follow to stay safe| BlackFog
Why should firms be considering data security services as part of their cyber protection strategy?| BlackFog
Discover how cybersecurity risk management is different for growing organizations and how security leaders are adapting to a rapidly changing risk environment.| BlackFog
What essential ransomware prevention steps must businesses take as the scale of this threat continues to rise?| BlackFog
Research found that more than 255 million phishing attacks occurred in 2022, that’s a 61% increase compared to 2021.| BlackFog
Ask these key questions as part of your data breach investigation and mitigation checklist to stand the best chance of recovering from a data breach.| BlackFog
What should a data protection strategy include in 2023 and why is it a vital part of your business' defenses?| BlackFog
Why is having the right tools for data exfiltration prevention so important?| BlackFog
What protections do enterprise DLP tools provide and why should firms be looking beyond legacy solutions to defend against data loss?| BlackFog
Tracking ransomware in 2022 has given us some important insight and salient lessons learned from ransomware and about tackling this escalating problem.| BlackFog
Why do enterprise data security strategies need to evolve to cope with a new range of threats?| BlackFog
The cost of insider threats to businesses is on the rise, so how can you prevent data being compromised by these actions?| BlackFog
On-device protection for businesses' growing digital footprint is essential in protecting firms from data exfiltration - find out why this is a growing priority.| BlackFog
What can firms do to guard against a ransomware attack and ensure they can recover quickly if they do fall victim?| BlackFog
Ransomware cyberattacks are a big business in 2020. Cybercriminals cost business around 20 billion a year.| BlackFog
Adapting zero-trust network security principles for use with AI is one way in which businesses can defend models from LLM prompt injection attacks.| BlackFog
Following these key best practices will be vital if firms are to reduce the risks posed by AI prompt hacking attacks.| BlackFog
Find out why cybersecurity pros should be treating AI prompt injection hacks in the same way as social engineering attacks.| BlackFog
What does adaptive security involve and why is it essential in an era of AI-powered cyberthreats?| BlackFog
Understand how AI prompt injection attacks work, the damage they can cause and how to stop them in this comprehensive guide.| BlackFog
Learn about some of the key LLM cybersecurity issues that need to be considered when adding tools like generative AI to firms' systems.| BlackFog
What network and website security issues should firms be looking at to ensure their sensitive information is fully protected from data breaches?| BlackFog
Find out why microsegmentation is an increasingly popular option for supporting zero trust networking approaches.| BlackFog
Learn about the risk posed by zero day security exploits and what firms can do to minimize their exposure to these issues.| BlackFog
What is double extortion ransomware and what should firms know in order to protect against this threat.| BlackFog
What data exfiltration techniques are being used to target businesses with threats such as ransomware in 2023?| BlackFog
If don’t have a data exfiltration strategy, the good news is you're not alone. Most organizations are still focussed on protecting the perimeter.| BlackFog
Ransomware cyberattacks are a big business in 2021. Damages from cybercrime expected to hit $6 trillion.| BlackFog
How Data Exfiltration prevention could have stopped the top 10 cyberattacks of 2020.| BlackFog
We have seen major data breaches from many large organizations including Cognizant, GoDaddy and Marriott. Data breach prevention is more crucial than ever before.| BlackFog
What do firms need to know about exfiltration of data in order to keep their operations secure?| BlackFog
Data exfiltration, data loss or data leakage is essentially the theft or removal of information or data from an electronic device.| BlackFog
What do businesses need to know in order to minimize the risks posed by data exfiltration?| BlackFog
What is data exfiltration and how can it harm your business? Find out everything you need to know about these cyberattacks.| BlackFog
Why should a data exfiltration detection solution play a key role in your firm's cybersecurity strategy?| BlackFog
Anti Data Exfiltration (ADX) provides a new solution to data security as opposed to the more traditional Data Loss Prevention (DLP) model.| BlackFog
Where Endpoint Security relies on data matching algorithms, Anti Data Exfiltration monitors outbound traffic and restricts data from leaving the network.| BlackFog
Everything you need to know about ransomware: what is ransomware, different types of ransomware, how it spreads, impact, and how to protect against it.| BlackFog
In this white paper, we report on a survey on data exfiltration and introduce the category of Anti Data Exfiltration (ADX) cybersecurity solutions.| BlackFog
This report details the state of ransomware in 2022 on a month by month basis that have been publicly disclosed.| BlackFog
BlackFog research highlights that a skills shortage is halting cybersecurity adoption and the practical challenges of managing a complex threat landscape.| BlackFog
Data exfiltration 101 describes the types of attacks that lead to data exfiltration and why 83% of all attacks rely on it as the primary vector.| BlackFog
Fileless PowerShell attacks are now the preferred weapon of choice for cyberattacks because they provide a number of techniques around existing security.| BlackFog
What do businesses need to be doing in order to improve their data exfiltration detection capabilities?| BlackFog
Find out everything you need to know about the importance of stopping data theft and the potential consequences of failure.| BlackFog
BlackFog's state of ransomware 2025 report measures publicly disclosed and non-disclosed attacks globally.| BlackFog
Cybersecurity was still very much dominated by ransomware attacks in 2024. In this article we look back at five of the most notable incidents of the year.| BlackFog
Why must anti data exfiltration tools be a critical part of your data security strategy?| BlackFog
Since 2020 BlackFog has measured publicly disclosed attacks globally. The 2022 ransomware attack report reflects on the key findings from 2022.| BlackFog
Pricing includes specified features for 10-250 users. Billed monthly. Contact BlackFog for details and pricing for larger volumes.| BlackFog
Fileless network protection is a key element to device security and is an important part of a layered approach to security.| BlackFog
BlackFog Dark Web protection prevents data loss, activation and transfer of malware over the Dark Web.| BlackFog
Ensure you're aware of these common types of data breaches to stand the best chance of protecting your valuable information| BlackFog
BlackFog Enterprise provides real-time data privacy and data security protection against online threats and can be centrally managed via a cloud console.| BlackFog
We'd love to hear from you! Contact BlackFog today by completeing the form below and we'll get back to you shortly.| BlackFog
What are the main types of ransomware and how can you recognize them?| BlackFog
Our ransomware roundup Q1 2024 broke new records with 192 publicly disclosed ransomware attacks, an increase of 48% over 2023.| BlackFog
Are you aware of the difference between data protection and data security? Here's what you know to keep your data safe| BlackFog
With the rising costs of cyberattacks data privacy and security are critical topics and safeguarding sensitive data is more important than ever.| BlackFog
Find out everything you need to know about how to recover from ransomware attacks| BlackFog
BlackFog's state of ransomware 2024 report measures publicly disclosed and non-disclosed attacks globally.| BlackFog
Ransomware gangs continue to break records and BlackFog will track all new ransomware gangs in 2024.| BlackFog
The 2023 ransomware attack report summarizes the major changes we saw in ransomware trends and tactics by geography, sector and variant.| BlackFog
Ransomware trends of 2023 include supply chain attacks, double extortions, law enforcement actions and challenges for the regulators.| BlackFog
We discuss the latest ransomware takedowns in the fight against ransomware.| BlackFog
BlackFog research highlights how SMBs were victims of cyberattack in the last year and the importance of having a trusted partner.| BlackFog
Ransomware repeat attacks are now a common trend across all organizations with 67% suffering a repeat attack within 12 months of the original incident.| BlackFog
BlackFog's state of ransomware 2023 report measures publicly disclosed attacks globally.| BlackFog