Cloud Security Blog - Netskope

See what's going on in the cloud security service industry. We cover topics including cloud app security, cloud solutions, cloud vulnerabilities & more.

  • Envisioning and delivering stronger, collaborative security from cloud to endpoint

    Envisioning and delivering stronger, collaborative security from cloud to endpoint

    Generational wisdom has always held that there is strength in unity. When it comes to security products and defending against malicious actors, every security practitioner would point out that...

    Read Item
  • Technical Analysis of Xbooster parasitic Monero Miner

    Technical Analysis of Xbooster parasitic Monero Miner

    We recently published an article about the Xbooster parasitic malware campaign that uses Amazon Web Services (AWS) to deliver the payloads and exfiltrate victims host details. This blog will...

    Read Item
  • ×

    Get the latest posts to your inbox.

    Subscribe to the Cloud Security Blog

    Netskope would like to ​send you additional marketing information and ​share your personal data with our trusted third-parties for marketing purposes. ​Please check the box to ​opt-in and agree to our privacy policy ​which includes instructions on how to opt-out at any time​.
    Yes, I am opting in and agree with Netskope's privacy policy.
    Thank you!
    Error - something went wrong!
  • Fishing for data loss and unexpectedly catching malware

    Fishing for data loss and unexpectedly catching malware

    We are starting to see a trend develop with Netskope customers who initially focus on a set of cloud security use cases, then end up expanding their use case coverage based on what was uncovered...

    Read Item
  • Reporting: the final piece of the GDPR puzzle

    Reporting: the final piece of the GDPR puzzle

    Reporting might be the final of the four stages of GDPR compliance, and it’s possibly not a topic which is going to set anyone’s world alight, but neither of those things make it any less...

    Read Item
  • Gartner Magic Quadrant for Cloud Access Security Broker

    Get Your Copy
  • Xbooster Parasitic Monero Mining Campaign

    Xbooster Parasitic Monero Mining Campaign

    Netskope Threat Research Labs discovered a parasitic Monero mining malware campaign named xbooster that was successful in generating close to $100,000 USD using multiple Monero accounts. The...

    Read Item
  • Smart Cloud Security: How to Protect Against Password Email Abuse

    Smart Cloud Security: How to Protect Against Password Email Abuse

    Raise your hand if you’ve ever shared passwords through email when a colleague asks for the credentials to a shared cloud service? I know I’ve been guilty of it. It’s easy and quick to be able to...

    Read Item
  • Resurgence of Phishing-as-a-Service (PhaaS) platforms

    Resurgence of Phishing-as-a-Service (PhaaS) platforms

    Last year, Netskope Threat Research Labs discovered Hackshit Phishing as a Service (PhaaS) platform that recorded the victims credentials via websocket service hosted in Amazon S3. Eventually,...

    Read Item
  • Netskope Discovers ATMJackpot Siphoning Cash

    Netskope Discovers ATMJackpot Siphoning Cash

    Netskope Threat Research Labs has discovered a new ATM malware, “ATMJackpot.” The malware seems to have originated from Hong Kong and has a time stamp on the binary as 28th March 2018. It is...

    Read Item
  • Promote workplace productivity and security with Netskope and VMware Workspace ONE

    Promote workplace productivity and security with Netskope and VMware Workspace ONE

    In today’s mobile and cloud world, securing sensitive data across SaaS, IaaS, and PaaS as part of the digital workspace experience is critical. The integration between Netskope and VMware...

    Read Item
  • Introducing Netskope for Web: it’s time for smart cloud security

    Introducing Netskope for Web: it’s time for smart cloud security

    As enterprises embrace digital transformation across all facets of their operations, the corporate network is undergoing a massive overhaul. With critical data now residing in SaaS and IaaS...

    Read Item
  • Why IT must play the role of enforcer when it comes to GDPR readiness

    Why IT must play the role of enforcer when it comes to GDPR readiness

    Roy Keane. Patrick Vieira. Martin Johnson. Marshawn Lynch. Whether it’s football, rugby or NFL, most sports with a physical element have famous “enforcers.” These tend to be known tough guys who...

    Read Item
  • Answering the call for continuous IaaS security

    Answering the call for continuous IaaS security

    At Netskope, we have always thought holistically about visibility and security for infrastructure-as-a-service (IaaS). Comprehensive security for IaaS cannot be provided with just a single...

    Read Item
  • ×

    Get the latest posts to your inbox.

    Subscribe to the Cloud Security Blog

    Netskope would like to ​send you additional marketing information and ​share your personal data with our trusted third-parties for marketing purposes. ​Please check the box to ​opt-in and agree to our privacy policy ​which includes instructions on how to opt-out at any time​.
    Yes, I am opting in and agree with Netskope's privacy policy.
    Thank you!
    Error - something went wrong!
  • How do you use your Netskope and TITUS Deployments?

    How do you use your Netskope and TITUS Deployments?

    Companies need to ensure that documents are appropriately and explicitly allowed to be shared with external users based on their sensitivity across all architectures and wherever that content is...

    Read Item
  • Policies Need Enforcement to Help Compliance

    Policies Need Enforcement to Help Compliance

    The EU General Data Protection Regulation (GDPR) places considerable responsibility on both controllers and processors concerning keeping documentation, providing information to data subjects and...

    Read Item
  • Netskope Cloud Report: HR and Marketing Cloud Usage Grows, Despite Looming GDPR Deadline

    Netskope Cloud Report: HR and Marketing Cloud Usage Grows, Despite Looming GDPR Deadline

    We released the latest version of the Netskope Cloud Report today. This quarter, organizations’ cloud usage increased to 1,181 average apps per organization, from 1,022 last report. 92.7 percent...

    Read Item
  • Netskope Cloud Report: HR and Marketing Cloud Usage Grows, Despite Looming GDPR Deadline

    Netskope Cloud Report: HR and Marketing Cloud Usage Grows, Despite Looming GDPR Deadline

    We released the latest version of the Netskope Cloud Report today. This quarter, organizations’ cloud usage increased to 1,181 average apps per organization, from 1,022 last report. 92.7 percent...

    Read Item
  • ShortJSRAT leverages cloud with scriptlets

    ShortJSRAT leverages cloud with scriptlets

    Netskope Threat Research Labs has identified a new malware named “ShortJSRAT” which uses a Windows script component scriptlet file with a .sct extension. The scripts we observed used cloud apps...

    Read Item
  • ShortJSRAT leverages cloud with scriptlets

    ShortJSRAT leverages cloud with scriptlets

    Netskope Threat Research Labs has identified a new malware named “ShortJSRAT” which uses a Windows script component scriptlet file with a .sct extension. The scripts we observed used cloud apps...

    Read Item
  • Pony Loader exfiltrates user and wallet data

    Pony Loader exfiltrates user and wallet data

    Netskope Threat Research Labs has detected two variants of a data theft malware named Pony Loader resident in  SaaS accounts, with one looking for around 35 different crypto-currency wallet...

    Read Item
  • Pony Loader exfiltrates user and wallet data

    Pony Loader exfiltrates user and wallet data

    Netskope Threat Research Labs has detected two variants of a data theft malware named Pony Loader resident in  SaaS accounts, with one looking for around 35 different crypto-currency wallet...

    Read Item
  • loading
    Loading More...