<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
    <channel>
        <title><![CDATA[ZeroFox Blog posts | RSS Feed]]></title>
        <description><![CDATA[Digital Risk Protection platform built for enterprises]]></description>
        <link>https://www.zerofox.com</link>
        <generator>RSS for Node</generator>
        <lastBuildDate>Sun, 24 May 2026 02:37:54 GMT</lastBuildDate>
        <atom:link href="https://www.zerofox.com/rss.xml" rel="self" type="application/rss+xml"/>
        <pubDate>Sun, 24 May 2026 02:37:54 GMT</pubDate>
        <copyright><![CDATA[Copyright 2026 By ZeroFox. All rights reserved]]></copyright>
        <item>
            <title><![CDATA[How a Leading Airline Shut Down Social Impersonators and Phishing Comments in Under a Week]]></title>
            <description><![CDATA[<p>A customer drops a frustrated comment under a post: “Can someone help me with my booking?” Within minutes, a “support” account replies with a friendly tone, a sense of urgency, and a link that definitely doesn’t belong there. It looks and sounds like customer service, but it’s not. In reality, it&#8217;s a scammer acting at [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/airline-shut-down-social-impersonators-and-phishing-comments</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/airline-shut-down-social-impersonators-and-phishing-comments</guid>
            <dc:creator><![CDATA[ZeroFox Team]]></dc:creator>
            <pubDate>Wed, 20 May 2026 11:16:38 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/05/iStock-2147717228.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[When Data Means Conversations and Code: How AI-Powered Adversaries Are Rewriting the Rules of Targeted Attacks]]></title>
            <description><![CDATA[<p>For years, the security industry drew a fairly clear line around what &#8220;sensitive data&#8221; meant. Personal information, financial records, health data: the structured, regulated categories that compliance frameworks were built to protect. Encrypt it, tokenize it, and restrict access to it. The threat model was straightforward: if you protect the database, you protect the business. [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/ai-powered-adversaries</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/ai-powered-adversaries</guid>
            <dc:creator><![CDATA[Neil Correa]]></dc:creator>
            <pubDate>Wed, 13 May 2026 10:10:04 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2025/12/iStock-1332350872-2.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[When Phishing Takedowns Are Not Enough: ZeroFox vs. Netcraft for Enterprise Brand Protection]]></title>
            <description><![CDATA[<p>Netcraft has been in the internet security game since 1995, and they&#8217;ve earned a credible reputation for fast phishing detection and domain phishing takedowns. If your primary concern is malicious domains, they bring speed, automation, and deep relationships with internet infrastructure providers. But modern brand abuse doesn&#8217;t stop at phishing sites. Threat actors now impersonate [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/zerofox-vs-netcraft-enterprise-brand-protection</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/zerofox-vs-netcraft-enterprise-brand-protection</guid>
            <dc:creator><![CDATA[ZeroFox Team]]></dc:creator>
            <pubDate>Mon, 11 May 2026 08:56:33 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2025/10/Screenshot-2025-10-06-at-9.27.29-AM-1049x675.png" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[How Malware Sandboxing Closes the Confidence Gap in External Threat Intelligence]]></title>
            <description><![CDATA[<p>I&#8217;ve spent enough time in investigation queues to know what a bad workflow feels like. You get an alert. Something looks wrong. You already know it&#8217;s probably malicious, but &#8220;probably&#8221; doesn&#8217;t close a ticket or justify a takedown. You need confirmation. So you leave the platform, find the right tool, upload the file, wait, get [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/malware-sandboxing-closes-gap-in-external-threat-intelligence</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/malware-sandboxing-closes-gap-in-external-threat-intelligence</guid>
            <dc:creator><![CDATA[Josh Mayfield]]></dc:creator>
            <pubDate>Thu, 07 May 2026 10:44:04 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/05/iStock-1730012119.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[What We Feel Makes a Leader in the Gartner® Magic Quadrantᵀᴹ for Cyberthreat Intelligence Technologies]]></title>
            <description><![CDATA[<p>The cyber threat intelligence market is evolving from pieced together systems to unified platforms. What used to be a landscape of necessary but siloed tools, one for digital risk protection, another for threat feeds, another for takedowns, is converging into a single discipline where discovery, validation, and disruption all need to work together. We think [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/gartner-magic-quadrant-leader</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/gartner-magic-quadrant-leader</guid>
            <dc:creator><![CDATA[ZeroFox Team]]></dc:creator>
            <pubDate>Tue, 05 May 2026 09:21:38 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/05/GartnerMQ_Asset-Card-Blog-Hero-2-2.png" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[PSI Regional Forecasts: Because Your Security Team Shouldn’t Be the Last to Know]]></title>
            <description><![CDATA[<p>ZeroFox PSI Regional Forecasts give security teams a monthly forward look at the threats most likely to affect their operations. Delivered directly in the ZeroFox platform, before incidents happen. The Problem With Reactive Security Most physical security programs run in the same loop: an incident happens, the team mobilizes, and an after-action report gets filed. [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/psi-regional-forecasts-because-your-security-team-shouldnt-be-the-last-to-know</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/psi-regional-forecasts-because-your-security-team-shouldnt-be-the-last-to-know</guid>
            <dc:creator><![CDATA[Esmeralda Sayagues]]></dc:creator>
            <pubDate>Tue, 21 Apr 2026 09:50:54 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/04/iStock-1334455983.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[The Claude Mythos Problem: AI Vulnerability Scanning Has Trust Issues]]></title>
            <description><![CDATA[<p>When frontier AI scanning capability lands inside organizations with competitive incentives and Anthropic&#8217;s oversight telemetry remains unspecified, the threat model gets a lot wider than jailbreakers and dark web exploit sellers. Anthropic’s announcement of Claude Mythos Preview landed the way most frontier AI milestones do: as a security story dressed in a safety narrative. The [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/the-claude-mythos-problem</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/the-claude-mythos-problem</guid>
            <dc:creator><![CDATA[Nico Flores]]></dc:creator>
            <pubDate>Mon, 20 Apr 2026 11:27:45 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/04/iStock-1138585444.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[Seeing Risk Isn&#8217;t Stopping Risk: What to Consider When Choosing an ASM Solution]]></title>
            <description><![CDATA[<p>Your security team just got another report. Hundreds of exposed assets with dozens of flagged vulnerabilities. A dashboard full of findings, color-coded by severity, timestamped, and ready for review. None of them have been fixed yet. This is the reality for most SOC teams operating with an attack surface management tool today. Somewhere between &#8220;we [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/seeing-risk-isnt-stopping-risk-what-to-consider-when-choosing-an-asm-solution</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/seeing-risk-isnt-stopping-risk-what-to-consider-when-choosing-an-asm-solution</guid>
            <dc:creator><![CDATA[Maddie Bullock]]></dc:creator>
            <pubDate>Wed, 08 Apr 2026 10:48:54 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/04/iStock-1491632431-1200x640.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[How to Quantify the Business Value of ZeroFox Threat Intelligence (And Why Forrester Did It For You)]]></title>
            <description><![CDATA[<p>Let&#8217;s get the uncomfortable truth out of the way first: proving the value of threat intelligence is hard. Not because the value isn&#8217;t real, but because the best outcomes in security are the things that didn&#8217;t happen. There’s value in the avoided incidents. Takedowns that stopped a phishing campaign before it touched a single customer. [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/quantify-the-business-value-of-zerofox-forrester-tei</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/quantify-the-business-value-of-zerofox-forrester-tei</guid>
            <dc:creator><![CDATA[Maddie Bullock]]></dc:creator>
            <pubDate>Wed, 01 Apr 2026 12:27:09 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/04/Forrester-TEI_Blog-Hero.png" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[What the New NIST Secure DNS Deployment Guidance Means to Enterprises, According to a ZeroFox Expert]]></title>
            <description><![CDATA[<p>NIST&#8217;s updated guidance on secure DNS deployment has direct implications for how organizations protect their external digital presence. This is what you need to act on. The Domain Name System has long been treated as plumbing, like invisible infrastructure that just works. That perception is increasingly dangerous.&nbsp; In March 2026, the National Institute of Standards [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/new-nist-secure-dns-deployment-guidance</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/new-nist-secure-dns-deployment-guidance</guid>
            <dc:creator><![CDATA[Carlos Alvarez]]></dc:creator>
            <pubDate>Thu, 26 Mar 2026 09:30:35 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/03/iStock-1396014583.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[Integrating Attack Surface Intelligence with Threat Intelligence: Moving from Visibility to Action]]></title>
            <description><![CDATA[<p>The digital transformation has generated tremendous value for businesses, but it has also brought unprecedented exposure extending the external attack surface. Every organization now operates across a sprawling network of cloud services, web applications, social media accounts, third-party integrations, and interconnected systems. Shadow IT further compounds this sprawl as departments deploy services without centralized oversight. [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/attack-surface-intelligence-with-threat-intelligence</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/attack-surface-intelligence-with-threat-intelligence</guid>
            <dc:creator><![CDATA[ZeroFox Team]]></dc:creator>
            <pubDate>Wed, 25 Mar 2026 11:14:57 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/03/iStock-1325000752.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[Stop Threats, Don’t Just Study Them: How AI Is Transforming Attack Surface Intelligence]]></title>
            <description><![CDATA[<p>Modern organizations succeed by expanding their offerings, updating their technologies, and meeting customers where they are. But the internet is a shared, high-risk environment, and the more you grow, the harder it is to balance your business needs with security. Meanwhile, traditional approaches to managing digital risk can no longer keep pace with an attack [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/ai-attack-surface-intelligence</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/ai-attack-surface-intelligence</guid>
            <dc:creator><![CDATA[ZeroFox Team]]></dc:creator>
            <pubDate>Wed, 18 Mar 2026 11:08:08 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/03/iStock-1392330918.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[Brand Monitoring and Enforcement: Why AI Alone Isn’t Enough]]></title>
            <description><![CDATA[<p>AI-powered brand protection is having a moment. Across the market, new platforms promise fully autonomous detection, real-time campaign clustering, and automated takedowns across domains, social media, messaging apps, and more. The pitch is compelling: faster alerts, less manual work, and AI-native defense built for modern deception. But brand monitoring and enforcement are not the same [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/brand-monitoring-and-enforcement-why-ai-alone-isnt-enough</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/brand-monitoring-and-enforcement-why-ai-alone-isnt-enough</guid>
            <dc:creator><![CDATA[Maddie Bullock]]></dc:creator>
            <pubDate>Mon, 16 Mar 2026 13:23:33 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/03/iStock-1444916669.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[How Retail Companies Can Prevent Cyber Attacks with EASM]]></title>
            <description><![CDATA[<p>In 2025, the Scattered Spider group shocked the retail sector with a barrage of ransomware attacks against well‑known UK companies, including Marks &amp; Spencer (M&amp;S) and Co‑op. The scale of these incidents—and the fact that three of the four people arrested in connection with the attacks were teenagers—highlighted the vulnerability of modern retail and its [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/retail-companies-prevent-cyber-attaks</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/retail-companies-prevent-cyber-attaks</guid>
            <dc:creator><![CDATA[ZeroFox Team]]></dc:creator>
            <pubDate>Wed, 11 Mar 2026 09:47:52 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/03/iStock-1358062027.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[Attack Surface Intelligence for Financial Services: Essential Guide for 2026]]></title>
            <description><![CDATA[<p>Financial institutions have always been high-value targets. What’s changed is how many ways an attacker can reach them. Today’s financial ecosystem runs on cloud services, APIs, digital banking platforms, and third-party integrations that make transactions faster and customer experiences smoother. They also expand the number of internet-facing assets that can be scanned, tested, and exploited. [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/attack-surface-intelligence-for-financial-services</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/attack-surface-intelligence-for-financial-services</guid>
            <dc:creator><![CDATA[ZeroFox Team]]></dc:creator>
            <pubDate>Wed, 04 Mar 2026 13:02:46 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/03/iStock-1053421706.jpg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[Why the Family is the New Attack Surface]]></title>
            <description><![CDATA[<p>Executives do not live inside your network diagrams. They live in smart homes full of connected devices, with spouses and partners who share online by default and children whose digital lives spill across social platforms. That blended ecosystem has effectively become the perimeter of executive risk. The Invisible Target The Old Security Model No Longer [&hellip;]</p>
]]></description>
            <link>https://www.zerofox.com/blog/why-the-family-is-the-new-attack-surface</link>
            <guid isPermaLink="false">https://www.zerofox.com/blog/why-the-family-is-the-new-attack-surface</guid>
            <dc:creator><![CDATA[Kelly Kuebelbeck]]></dc:creator>
            <pubDate>Wed, 11 Feb 2026 14:28:13 GMT</pubDate>
            <enclosure url="https://content.zerofox.com/wp-content/uploads/2026/02/iStock-1190168553.jpg" length="0" type="image/jpeg"/>
        </item>
    </channel>
</rss>