Sebastian Raiffen

Sebastian Raiffen

IT Security Consultant
Sebastian Raiffen is an IT expert specializing in security development. He explores the latest in cybersecurity and offers practical tools and strategies for enhancing digital defense. His signature writing style incorporates meticulous research and analysis, producing technical content that ranges from dissecting malware to deciphering encryption algorithms. Sebastian is sought after for his in-depth security commentary and expert advice.
Google Uncovers Apps Hijacking Devices for Cybercrime
Infrastructure & Network Security Google Uncovers Apps Hijacking Devices for Cybercrime

Today we’re speaking with Rupert Marais, our in-house security specialist, about a threat that turns the very devices we trust into tools for cybercrime. We'll be exploring the shadowy world of illicit proxy networks, like the recently dismantled IPIDEA operation, which co-opted millions of user

TPx Launches Managed SASE to Secure Cloud Networks
Infrastructure & Network Security TPx Launches Managed SASE to Secure Cloud Networks

The traditional corporate network perimeter has effectively dissolved, leaving businesses to grapple with securing a distributed workforce and cloud-based applications that exist far beyond the confines of a central office. As organizations increasingly migrate away from legacy data centers toward

Is Forgotten Tech Your Biggest Security Risk?
Endpoint & Device Security Is Forgotten Tech Your Biggest Security Risk?

Today we’re speaking with Rupert Marais, our in-house Security Specialist, whose expertise in endpoint and device security is especially relevant given recent events. A critical, decade-old vulnerability in a common Telnet server has suddenly surfaced, impacting hundreds of thousands of devices

Critical Grist Flaw Allows RCE via Spreadsheet Formulas
Malware & Threats Critical Grist Flaw Allows RCE via Spreadsheet Formulas

The unassuming grid of a spreadsheet rarely conjures images of a cybersecurity breach, yet a critical vulnerability recently uncovered in the Grist platform demonstrates how a single formula can become a potent weapon for remote code execution. A severe flaw identified in Grist-Core, the

Which 5 Accounts Need MFA Protection Now?
Infrastructure & Network Security Which 5 Accounts Need MFA Protection Now?

A single compromised password can unravel an entire digital life in minutes, a reality that has become starkly apparent as cybercrime reports continue to climb, yet remarkably common and weak passwords like '123456' persist in widespread use. In this environment, relying on a password alone is akin

eScan Antivirus Breach Delivers Signed Malware via Updates
Identity & Access Management eScan Antivirus Breach Delivers Signed Malware via Updates

The very tools designed to protect digital environments have become the conduits for a sophisticated cyberattack, turning a trusted antivirus solution into an unwitting distributor of malware that evades conventional security checks. A recent investigation has uncovered a critical supply chain

Data Leak Exposes 48 Million Gmail Passwords
Identity & Access Management Data Leak Exposes 48 Million Gmail Passwords

A security incident of staggering proportions came to light in January 2026, revealing that a publicly accessible dataset contained the usernames and passwords for an estimated 48 million Gmail accounts. This massive collection of credentials was part of an even larger dump totaling 149 million

Are Automated Scans Enough to Secure Your Web Apps?
Infrastructure & Network Security Are Automated Scans Enough to Secure Your Web Apps?

As organizations accelerate their digital transformation initiatives, the proliferation of web applications—from vital customer-facing portals to critical internal management systems—has dramatically expanded the digital attack surface, making them a primary target for increasingly sophisticated

Phishing Poses Top Cyber Risk to 2026 Winter Games
Endpoint & Device Security Phishing Poses Top Cyber Risk to 2026 Winter Games

As the world turns its attention to the spectacle of the Milano-Cortina Winter Games, a less visible but equally intense competition is unfolding in the digital realm, where cybercriminals are preparing to exploit the event's vast interconnected infrastructure. A recent assessment of the cyber

Multi-Stage Attack Deploys RAT and Ransomware in Russia
Malware & Threats Multi-Stage Attack Deploys RAT and Ransomware in Russia

Today, we’re sitting down with Rupert Marais, our in-house security specialist, to dissect a sophisticated multi-stage phishing campaign recently targeting Russia. This attack is a masterclass in modern evasion techniques, blending social engineering with the abuse of legitimate public cloud

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later