Executive Summary Last fall, Black Lotus Labs discovered in the wild what had until then only been theorized: Linux binaries were being used as loaders in Windows Subsystem for Linux (WSL). Since our initial report, Black Lotus Labs continues to […]
Discover top-tier, integrated cybersecurity solutions designed to protect your business. Stay updated on the latest trends in the cybersecurity landscape and learn how advanced threat intelligence and actionable insights can help you swiftly identify and counter today’s most significant cyber threats. Explore our cybersecurity solutions to unlock efficiencies, automate protection, and neutralize threats with transformative security technology and expert consulting.
Executive Summary Last fall, Black Lotus Labs discovered in the wild what had until then only been theorized: Linux binaries were being used as loaders in Windows Subsystem for Linux (WSL). Since our initial report, Black Lotus Labs continues to […]
What Global Network Visibility Reveals about the Resurgence of One of the World’s Most Notorious Botnets Executive Summary Since its reemergence on Nov. 14, 2021, Black Lotus Labs has once again been tracking Emotet, one of the world’s most prolific […]
Keeping up with the latest cybersecurity trends is a continuous journey—because no matter how vigilant a company is or how well they orchestrate their cyber defenses, bad actors are highly motivated to evolve their methods, find new vulnerabilities, and exploit […]
Very few weeks go by without headlines circulating about cybercrime. It could be a large data breach or a ransomware attack. Yet, somehow this regular drumbeat of news manages to obscure just how huge a problem we face and the […]
In professional sports, there’s a saying: Offense wins games, defense wins championships. With football’s Big Game ringing in our ears, it’s a good time to consider how that idea applies to hard-charging startups trying to scale their success. In football, […]
Executive Summary Black Lotus Labs, the threat research team of Lumen Technologies, uncovered a series of targeted actions against the Russian Federation’s Ministry of Foreign Affairs (MID). Based upon the totality of information available and the close correlation with prior […]
Healthcare-related business from clinics through to insurance providers and pharmaceutical companies face significant challenges in the coming years. They are changing the way they produce and access data, opening up new opportunities for supply chain efficiency, customer service, and patient […]
As an IT consultant with 20 years in the business, Arnaud Cassagne has seen — and been part of — the evolution in IT infrastructure that’s been ongoing since the turn of the century. He’s worked with organizations as they’ve […]
In the first half of our SASE series, we addressed some of the basics of the SASE framework – what it is, who it’s designed for and some common misconceptions about what SASE does and doesn’t do. In the second […]
Is anyone else tired? When looking at the sheer scale of the cybersecurity landscape it can feel like a never-ending stream of changes. Much like Sisyphus pushing the boulder up the mountain, just when you feel like you have a […]