Sebastian Raiffen

Sebastian Raiffen

IT Security Consultant
Sebastian Raiffen is an IT expert specializing in security development. He explores the latest in cybersecurity and offers practical tools and strategies for enhancing digital defense. His signature writing style incorporates meticulous research and analysis, producing technical content that ranges from dissecting malware to deciphering encryption algorithms. Sebastian is sought after for his in-depth security commentary and expert advice.
Microsoft Entra ID Attack Exploits TeamFiltration Tool
Infrastructure & Network Security Microsoft Entra ID Attack Exploits TeamFiltration Tool

Imagine a scenario where thousands of corporate accounts are compromised by a sophisticated cyberattack, spreading like wildfire across global enterprises. In January, cybersecurity researchers unveiled a strikingly complex attack targeting over 80,000 Microsoft Entra ID accounts using the

Can Linux Exploit Patch by 2025 Stop Root Privilege Escalation?
Malware & Threats Can Linux Exploit Patch by 2025 Stop Root Privilege Escalation?

In the ever-evolving landscape of cybersecurity, vulnerabilities within operating systems present significant risks that require timely and effective resolutions. One such critical vulnerability that has gained attention is CVE-2023-0386, a flaw in the Linux kernel's OverlayFS subsystem. This

Is AI's Rise Transforming Spam and Malicious Emails?
Identity & Access Management Is AI's Rise Transforming Spam and Malicious Emails?

In a rapidly evolving technological landscape, Rupert Marais stands out as an expert in cybersecurity, particularly in endpoint and device security, cybersecurity strategies, and network management. As he collaborates on research with notable institutions to unravel the complexities of AI in

Will Cellebrite-Corellium Deal Reshape Digital Forensics?
Endpoint & Device Security Will Cellebrite-Corellium Deal Reshape Digital Forensics?

In an industry marked by rapid evolution and heightened complexity, the acquisition of Corellium by Cellebrite presents a potent force capable of revolutionizing digital forensics. This strategic move involves a transaction worth $170 million, enhanced by a $30 million performance-linked bonus,

How Can Businesses Fight the Surge in PureRAT Cyber Attacks?
Infrastructure & Network Security How Can Businesses Fight the Surge in PureRAT Cyber Attacks?

In recent months, a new wave of cyber threats has been plaguing Russian businesses with alarming regularity, highlighting a surge in PureRAT attacks. This sophisticated malware has been disseminated through focused phishing campaigns, and the frequency of these attacks in 2025 shows a fourfold

How are Cyber Threats Evolving for Software Development?
Identity & Access Management How are Cyber Threats Evolving for Software Development?

Cyber threats are no longer confined to overt attacks on businesses or data breaches. In a twist that underscores the versatile nature of the digital landscape, software supply chain threats have emerged as sophisticated adversaries targeting development environments. As software becomes ever more

Defending Against LOTL Cyberattacks Using Trusted Tools
Endpoint & Device Security Defending Against LOTL Cyberattacks Using Trusted Tools

What if the tools designed to protect your organization became instruments of its own vulnerability? In today's digital landscape, living-off-the-land (LOTL) cyberattacks increasingly exploit legitimate software tools already present in IT environments. These attacks, which leverage trusted

Deepfake Audio Replay Attacks Pose New Security Threat
Endpoint & Device Security Deepfake Audio Replay Attacks Pose New Security Threat

In today's world, digital security faces a formidable challenge as advancements in deepfake audio technologies threaten to undermine established defenses. The rise of deepfake audio replay attacks, which involve playing and re-recording synthetic audio to bypass detection models, presents a

Is AI the Future of Cybersecurity Automation?
Infrastructure & Network Security Is AI the Future of Cybersecurity Automation?

In the ever-evolving realm of cybersecurity, organizations are navigating complex threats that require advanced solutions. Recent industry trends reveal a growing emphasis on adopting artificial intelligence (AI) to fortify security infrastructures with greater efficiency and precision. The

Rust-Based Malware Threats – A Review
Endpoint & Device Security Rust-Based Malware Threats – A Review

In recent years, the cybersecurity domain has witnessed the rise of a formidable adversary: Rust-based malware. This development marks a pivotal shift in how threat actors design and deploy their malicious software. The transition towards Rust, a language celebrated for its security features and

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later