<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
    <channel>
        <title><![CDATA[ZeroFox Blog posts | RSS Feed]]></title>
        <description><![CDATA[Digital Risk Protection platform built for enterprises]]></description>
        <link>https://www.zerofox.com</link>
        <generator>RSS for Node</generator>
        <lastBuildDate>Thu, 09 Apr 2026 18:22:17 GMT</lastBuildDate>
        <atom:link href="https://www.zerofox.com/rss.xml" rel="self" type="application/rss+xml"/>
        <pubDate>Thu, 09 Apr 2026 18:22:17 GMT</pubDate>
        <copyright><![CDATA[Copyright 2026 By ZeroFox. All rights reserved]]></copyright>
        <item>
            <title><![CDATA[Seeing Risk Isn&#8217;t Stopping Risk: What to Consider When Choosing an ASM Solution]]></title>
            <description><![CDATA[<p>Your security team just got another report. Hundreds of exposed assets with dozens of flagged vulnerabilities. A dashboard full of findings, color-coded by severity, timestamped, and ready for review. None of them have been fixed yet. This is the reality for most SOC teams operating with an attack surface management tool today. Somewhere between &#8220;we [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/seeing-risk-isnt-stopping-risk-what-to-consider-when-choosing-an-asm-solution</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/seeing-risk-isnt-stopping-risk-what-to-consider-when-choosing-an-asm-solution</guid>
            <dc:creator><![CDATA[Maddie Bullock]]></dc:creator>
            <pubDate>Wed, 08 Apr 2026 10:48:54 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/04/iStock-1491632431-1200x640.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[How to Quantify the Business Value of ZeroFox Threat Intelligence (And Why Forrester Did It For You)]]></title>
            <description><![CDATA[<p>Let&#8217;s get the uncomfortable truth out of the way first: proving the value of threat intelligence is hard. Not because the value isn&#8217;t real, but because the best outcomes in security are the things that didn&#8217;t happen. There’s value in the avoided incidents. Takedowns that stopped a phishing campaign before it touched a single customer. [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/quantify-the-business-value-of-zerofox-forrester-tei</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/quantify-the-business-value-of-zerofox-forrester-tei</guid>
            <dc:creator><![CDATA[Maddie Bullock]]></dc:creator>
            <pubDate>Wed, 01 Apr 2026 12:27:09 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/04/Forrester-TEI_Blog-Hero.png" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[What the New NIST Secure DNS Deployment Guidance Means to Enterprises, According to a ZeroFox Expert]]></title>
            <description><![CDATA[<p>NIST&#8217;s updated guidance on secure DNS deployment has direct implications for how organizations protect their external digital presence. This is what you need to act on. The Domain Name System has long been treated as plumbing, like invisible infrastructure that just works. That perception is increasingly dangerous.&nbsp; In March 2026, the National Institute of Standards [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/new-nist-secure-dns-deployment-guidance</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/new-nist-secure-dns-deployment-guidance</guid>
            <dc:creator><![CDATA[Carlos Alvarez]]></dc:creator>
            <pubDate>Thu, 26 Mar 2026 09:30:35 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/03/iStock-1396014583.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[Integrating Attack Surface Intelligence with Threat Intelligence: Moving from Visibility to Action]]></title>
            <description><![CDATA[<p>The digital transformation has generated tremendous value for businesses, but it has also brought unprecedented exposure extending the external attack surface. Every organization now operates across a sprawling network of cloud services, web applications, social media accounts, third-party integrations, and interconnected systems. Shadow IT further compounds this sprawl as departments deploy services without centralized oversight. [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/attack-surface-intelligence-with-threat-intelligence</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/attack-surface-intelligence-with-threat-intelligence</guid>
            <dc:creator><![CDATA[ZeroFox Team]]></dc:creator>
            <pubDate>Wed, 25 Mar 2026 11:14:57 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/03/iStock-1325000752.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[Stop Threats, Don’t Just Study Them: How AI Is Transforming Attack Surface Intelligence]]></title>
            <description><![CDATA[<p>Modern organizations succeed by expanding their offerings, updating their technologies, and meeting customers where they are. But the internet is a shared, high-risk environment, and the more you grow, the harder it is to balance your business needs with security. Meanwhile, traditional approaches to managing digital risk can no longer keep pace with an attack [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/ai-attack-surface-intelligence</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/ai-attack-surface-intelligence</guid>
            <dc:creator><![CDATA[ZeroFox Team]]></dc:creator>
            <pubDate>Wed, 18 Mar 2026 11:08:08 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/03/iStock-1392330918.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[Brand Monitoring and Enforcement: Why AI Alone Isn’t Enough]]></title>
            <description><![CDATA[<p>AI-powered brand protection is having a moment. Across the market, new platforms promise fully autonomous detection, real-time campaign clustering, and automated takedowns across domains, social media, messaging apps, and more. The pitch is compelling: faster alerts, less manual work, and AI-native defense built for modern deception. But brand monitoring and enforcement are not the same [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/brand-monitoring-and-enforcement-why-ai-alone-isnt-enough</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/brand-monitoring-and-enforcement-why-ai-alone-isnt-enough</guid>
            <dc:creator><![CDATA[Maddie Bullock]]></dc:creator>
            <pubDate>Mon, 16 Mar 2026 13:23:33 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/03/iStock-1444916669.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[How Retail Companies Can Prevent Cyber Attacks with EASM]]></title>
            <description><![CDATA[<p>In 2025, the Scattered Spider group shocked the retail sector with a barrage of ransomware attacks against well‑known UK companies, including Marks &amp; Spencer (M&amp;S) and Co‑op. The scale of these incidents—and the fact that three of the four people arrested in connection with the attacks were teenagers—highlighted the vulnerability of modern retail and its [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/retail-companies-prevent-cyber-attaks</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/retail-companies-prevent-cyber-attaks</guid>
            <dc:creator><![CDATA[ZeroFox Team]]></dc:creator>
            <pubDate>Wed, 11 Mar 2026 09:47:52 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/03/iStock-1358062027.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[Attack Surface Intelligence for Financial Services: Essential Guide for 2026]]></title>
            <description><![CDATA[<p>Financial institutions have always been high-value targets. What’s changed is how many ways an attacker can reach them. Today’s financial ecosystem runs on cloud services, APIs, digital banking platforms, and third-party integrations that make transactions faster and customer experiences smoother. They also expand the number of internet-facing assets that can be scanned, tested, and exploited. [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/attack-surface-intelligence-for-financial-services</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/attack-surface-intelligence-for-financial-services</guid>
            <dc:creator><![CDATA[ZeroFox Team]]></dc:creator>
            <pubDate>Wed, 04 Mar 2026 13:02:46 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/03/iStock-1053421706.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[Why the Family is the New Attack Surface]]></title>
            <description><![CDATA[<p>Executives do not live inside your network diagrams. They live in smart homes full of connected devices, with spouses and partners who share online by default and children whose digital lives spill across social platforms. That blended ecosystem has effectively become the perimeter of executive risk. The Invisible Target The Old Security Model No Longer [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/why-the-family-is-the-new-attack-surface</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/why-the-family-is-the-new-attack-surface</guid>
            <dc:creator><![CDATA[Kelly Kuebelbeck]]></dc:creator>
            <pubDate>Wed, 11 Feb 2026 14:28:13 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/02/iStock-1190168553.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[The Top Cyber Threats Facing the Milan 2026 Winter Olympics]]></title>
            <description><![CDATA[<p>The Olympic Games are one of the few global moments where nearly everyone is watching the same thing at the same time. Athletes, fans, sponsors, broadcasters, volunteers, and organizers all converge on a single digital ecosystem. While everyone is focused on the events, the many websites, apps, ticketing platforms, social channels, and travel services are [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/cyber-threats-milan-2026-winter-olympics</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/cyber-threats-milan-2026-winter-olympics</guid>
            <dc:creator><![CDATA[Maddie Bullock]]></dc:creator>
            <pubDate>Wed, 04 Feb 2026 12:36:00 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/02/Olympic-Blog-Header-ZeroFox.png" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[Inside the Underground Economy of Social Engineering]]></title>
            <description><![CDATA[<p>The phishing site was live for less than six hours. You&#8217;ve equipped your team with excellent threat intelligence and takedown services. Or so you thought. By the time the takedown request reached the appropriate provider, the infrastructure had already shifted. A new domain appeared with the same login page, your branding, and the same lure. [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/inside-the-underground-economy-of-social-engineering</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/inside-the-underground-economy-of-social-engineering</guid>
            <dc:creator><![CDATA[Maddie Bullock]]></dc:creator>
            <pubDate>Mon, 02 Feb 2026 12:22:46 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/02/iStock-941630258.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[Ransomware Didn’t Slow Down in Q4. Here’s What That Means for 2026.]]></title>
            <description><![CDATA[<p>A Record Quarter, Not an Outlier Your team is ready. They understand ransomware, the risks, and the stakes. But what does still catch teams off guard is how consistently the activity keeps climbing, even when experts expect it to slow down. In Q4 2025, ZeroFox Intelligence observed at least 2,091 ransomware and digital extortion incidents [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/ransomware-didnt-slow-down-in-q4-heres-what-that-means-for-2026</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/ransomware-didnt-slow-down-in-q4-heres-what-that-means-for-2026</guid>
            <dc:creator><![CDATA[Maddie Bullock]]></dc:creator>
            <pubDate>Wed, 28 Jan 2026 09:00:00 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/01/iStock-964851206.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[2026 Geopolitical Risk Forecast: Signals Security Leaders Can’t Ignore]]></title>
            <description><![CDATA[<p>The World Is Loud. These Are the Signals That Matter. The world has never been short on geopolitical headlines. But lately it can feel like we’re drowning in them. That overload leads to fatigue, both personally and for organizations, as the speed, scale, and proximity of risk continues to grow. At some point, even important [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/geopolitical-forecast-2026</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/geopolitical-forecast-2026</guid>
            <dc:creator><![CDATA[Maddie Bullock]]></dc:creator>
            <pubDate>Wed, 21 Jan 2026 12:17:15 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/01/iStock-2197565777.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[The Long Con Explained: How Romance Scams and AI-Enabled Social Engineering Steal Millions]]></title>
            <description><![CDATA[<p>How emotional manipulation became the most profitable scam on the internet and why AI is accelerating the crime wave Long-con romance scams work by building emotional trust over weeks or months, then using AI-generated messages, personas, and deepfake media to steal money or sensitive information.&nbsp; Let’s see how it works in practice. Late one evening, [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/the-long-con-explained-how-romance-scams-and-ai-enabled-social-engineering-steal-millions</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/the-long-con-explained-how-romance-scams-and-ai-enabled-social-engineering-steal-millions</guid>
            <dc:creator><![CDATA[Maddie Bullock]]></dc:creator>
            <pubDate>Wed, 07 Jan 2026 09:00:00 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2025/12/iStock-2228383398-2.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[Cyber-Physical Risk: The New Frontier of Executive Liability]]></title>
            <description><![CDATA[<p>Your home address is online. Your family&#8217;s routines can be inferred from public data. A convincing deepfake of you saying something inflammatory can spread globally in minutes. Traditional security teams might see these as three separate problems: one for data privacy, one for brand protection, and one for executive protection. But modern threat intelligence reveals [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/cyber-physical-risk-the-new-frontier-of-executive-liability</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/cyber-physical-risk-the-new-frontier-of-executive-liability</guid>
            <dc:creator><![CDATA[Kelly Kuebelbeck]]></dc:creator>
            <pubDate>Tue, 06 Jan 2026 13:52:47 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2024/12/Screenshot-2024-12-12-at-11.21.05 AM-1200x671.png" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[Is Bluesky Safe? A Complete Guide to Bluesky Security]]></title>
            <description><![CDATA[<p>Bluesky has rapidly become home to communities of activists, journalists, and tech-savvy users. It’s particularly attractive to anyone seeking alternatives to mainstream social spaces where they can come together, share information, and collaborate on campaigns.&nbsp; While not yet as high-profile as X/Twitter, TikTok, or Facebook, the platform has doubled in size over the last year [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/bluesky-security-guide</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/bluesky-security-guide</guid>
            <dc:creator><![CDATA[ZeroFox Team]]></dc:creator>
            <pubDate>Mon, 29 Dec 2025 09:00:00 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2025/12/iStock-1304423686.jpg" length="0" type="image/jpeg"/>
        </item>
    </channel>
</rss>