Sebastian Raiffen

Sebastian Raiffen

IT Security Consultant
Sebastian Raiffen is an IT expert specializing in security development. He explores the latest in cybersecurity and offers practical tools and strategies for enhancing digital defense. His signature writing style incorporates meticulous research and analysis, producing technical content that ranges from dissecting malware to deciphering encryption algorithms. Sebastian is sought after for his in-depth security commentary and expert advice.
New Android Malware Fuels Remote Tap-to-Pay Fraud
Infrastructure & Network Security New Android Malware Fuels Remote Tap-to-Pay Fraud

The convenience of tapping a phone to pay has become so commonplace that few consider the possibility of a criminal miles away executing that very same transaction on their behalf. This report analyzes the emergence of "Ghost Tap," a new category of Android malware enabling remote tap-to-pay fraud.

CISA Flags Unpatched Gogs Flaw Under Active Attack
Infrastructure & Network Security CISA Flags Unpatched Gogs Flaw Under Active Attack

The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding a high-severity vulnerability in the Gogs self-hosted Git service, confirming that the flaw is being actively exploited in the wild with no official patch currently available for administrators. The

New Cyberattack Targets Hotels Using a Fake BSOD
Endpoint & Device Security New Cyberattack Targets Hotels Using a Fake BSOD

A carefully orchestrated cyberattack is now exploiting one of the most universally recognized signs of computer trouble—the Blue Screen of Death—to deceive hotel employees into compromising their own networks. This new campaign, identified as PHALT#BLYX, represents a significant escalation in

What Makes the New Fog Ransomware So Dangerous?
Malware & Threats What Makes the New Fog Ransomware So Dangerous?

A highly focused and financially motivated ransomware campaign has been systematically targeting organizations across the United States, demonstrating a rapid and destructive operational model that prioritizes speed over subtlety. First identified in early May 2024, the threat, known as Fog

Has Federal Cybersecurity Finally Matured?
Infrastructure & Network Security Has Federal Cybersecurity Finally Matured?

From Crisis Response to Continuous Defense: A New Era for Federal Cybersecurity The recent announcement by the Cybersecurity and Infrastructure Security Agency to retire ten emergency directives is not a simple administrative cleanup but a profound signal that the federal government is moving

APT28 Targets European Entities in Phishing Campaign
Infrastructure & Network Security APT28 Targets European Entities in Phishing Campaign

With us today is Rupert Marais, our in-house Security Specialist, whose work in endpoint security and cyber strategy gives him a frontline view of the evolving threat landscape. We're delving into the persistent and cunning tactics of state-sponsored groups, specifically the Russian-linked APT28,

EU Scrutinizes X's Grok AI Over Harmful Photos
Data Protection & Privacy EU Scrutinizes X's Grok AI Over Harmful Photos

A single line of code designed to generate images has now forced a confrontation between one of the world's largest tech platforms and the European Union's powerful regulatory body, setting a critical precedent for the future of artificial intelligence. As stakeholders across the globe watch

Cisco Patches ISE Flaw Exposing System Files
Malware & Threats Cisco Patches ISE Flaw Exposing System Files

Cybersecurity advisories often highlight high-severity threats, but the recent patches from Cisco serve as a critical reminder from security experts that even a moderately-rated vulnerability within core network infrastructure can present an unacceptable level of risk. This roundup consolidates the

Is Venezuela the Next Cyber Warfare Battlefield?
Security Operations & Management Is Venezuela the Next Cyber Warfare Battlefield?

In the aftermath of a daring hypothetical raid that saw a world leader captured, the sudden darkness that enveloped Caracas raised a question far more complex than the military operation itself: was the city-wide blackout the result of a sophisticated cyberattack or simply the collateral damage of

AI Zero Trust Detects Attacks Without Files
Endpoint & Device Security AI Zero Trust Detects Attacks Without Files

Today, we're joined by Rupert Marais, an in-house Security Specialist whose work focuses on the sharp edge of cybersecurity: endpoint protection, strategic defense, and advanced network management. In our conversation, we will explore the shadowy world of modern, fileless attacks that traditional

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later