Sebastian Raiffen

Sebastian Raiffen

IT Security Consultant
Sebastian Raiffen is an IT expert specializing in security development. He explores the latest in cybersecurity and offers practical tools and strategies for enhancing digital defense. His signature writing style incorporates meticulous research and analysis, producing technical content that ranges from dissecting malware to deciphering encryption algorithms. Sebastian is sought after for his in-depth security commentary and expert advice.
Can FCC's IoT Security Program Survive Its Own Investigation?
Endpoint & Device Security Can FCC's IoT Security Program Survive Its Own Investigation?

As the U.S. government pushes forward with initiatives to secure Internet-of-Things (IoT) devices, the U.S. Cyber Trust Mark program has emerged as a cornerstone of this effort. Today, we’re joined by Rupert Marais, our in-house security specialist with deep expertise in endpoint and device

How Are Android Droppers Evolving to Bypass Google Security?
Endpoint & Device Security How Are Android Droppers Evolving to Bypass Google Security?

In the ever-shifting landscape of mobile security, Android users are facing a new wave of sophisticated threats that challenge even the most robust defenses, as cybercriminals adapt their tactics with remarkable ingenuity. These attackers use dropper apps to deliver not just traditional banking

Active Directory Security – Review
Identity & Access Management Active Directory Security – Review

Imagine a sprawling enterprise network, home to thousands of users and devices, suddenly brought to its knees by a single compromised credential, highlighting the critical importance of security. This scenario is not a distant fear but a reality for many organizations, as Active Directory (AD), the

29,000 Exchange Servers Unpatched for Critical Flaw
Identity & Access Management 29,000 Exchange Servers Unpatched for Critical Flaw

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we're diving into a critical issue affecting thousands of organizations worldwide: a high-severity

How Does ZipLine Attack Exploit Contact Us Forms for Cybercrime?
Security Operations & Management How Does ZipLine Attack Exploit Contact Us Forms for Cybercrime?

Imagine a seemingly harmless message arriving through a company's "Contact Us" form, initiating a conversation that appears legitimate, only to culminate in a devastating cyberattack that compromises sensitive data. This is the chilling reality of the ZipLine campaign, a sophisticated cybercrime

VMware Cloud Foundation – Review
Security Operations & Management VMware Cloud Foundation – Review

Imagine a world where escalating public cloud costs and data privacy concerns threaten enterprise IT stability, pushing organizations to rethink their infrastructure strategies and seek more sustainable solutions. In this landscape, VMware Cloud Foundation (VCF) emerges as a compelling private

What's New in Bun 1.2.21: Speed and Features Galore?
Security Operations & Management What's New in Bun 1.2.21: Speed and Features Galore?

Welcome to an insightful conversation about the latest developments in the JavaScript ecosystem! Today, we’re thrilled to chat with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. With his

Google Tightens Android Security with Developer Verification
Security Operations & Management Google Tightens Android Security with Developer Verification

Imagine downloading a unique app from outside the official store, only to discover it’s laced with malware that compromises your device, putting your personal data at risk. With sideloaded apps being over 50 times more likely to contain threats compared to those on the Google Play Store, Android

How Can Telemetry Transform Incident Response Strategies?
Security Operations & Management How Can Telemetry Transform Incident Response Strategies?

In an era where cyber threats evolve at an unprecedented pace, organizations face the daunting challenge of safeguarding their digital assets against increasingly sophisticated attacks. Imagine a scenario where a multinational corporation detects a ransomware attack in its early stages, not through

How Does Cisco Use AI to Defend Against Email Threats?
Infrastructure & Network Security How Does Cisco Use AI to Defend Against Email Threats?

In an era where digital communication underpins nearly every aspect of business, email continues to be a prime target for cybercriminals, presenting a formidable challenge for organizations across the globe. Cisco, a leader in technology and cybersecurity, processes over 326 million inbound emails

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later