Endpoint & Device Security

Shanya PaaS Emerges as a Potent EDR Killer for Ransomware
Endpoint & Device Security Shanya PaaS Emerges as a Potent EDR Killer for Ransomware

Today, we're sitting down with Rupert Marais, our in-house security specialist whose expertise spans endpoint protection, cybersecurity strategy, and network management. We're diving into the shadowy world of the "as-a-service" economy, moving beyond ransomware to a troubling new offering for

Storm-0249 Abuses EDR for Undetected Attacks
Endpoint & Device Security Storm-0249 Abuses EDR for Undetected Attacks

In an alarming evolution of cybercrime tactics, threat actors are now weaponizing the very security tools designed to protect enterprise networks, turning digital guardians into unwitting accomplices for stealthy infiltration. This research summary delves into the activities of the Initial Access

How Is Trusted AI Being Used to Spread Malware?
Endpoint & Device Security How Is Trusted AI Being Used to Spread Malware?

A sophisticated and deeply deceptive cyberattack methodology has emerged, weaponizing the very AI platforms that users have come to trust for reliable information, including OpenAI's ChatGPT and xAI's Grok. This attack vector, known as the "ClickFix Style Attack," leverages a potent combination of

Upgraded ClayRat Spyware Now Hijacks Android Devices
Endpoint & Device Security Upgraded ClayRat Spyware Now Hijacks Android Devices

With the recent Zimperium advisory on the ClayRat Android spyware, we're seeing a significant escalation in mobile threats. To understand the gravity of this evolution, we sat down with Rupert Marais, our in-house security specialist, whose work focuses on the very endpoint and device security now

Can a DVR Botnet Sink Maritime Operations?
Endpoint & Device Security Can a DVR Botnet Sink Maritime Operations?

In an era where global commerce relies heavily on the seamless operation of maritime vessels, a seemingly benign piece of surveillance equipment has emerged as a potential gateway for catastrophic digital sabotage. The recent identification of a sophisticated, Mirai-based botnet named "Broadside"

Critical Apache Tika Flaw Needs Urgent Second Fix
Endpoint & Device Security Critical Apache Tika Flaw Needs Urgent Second Fix

The recent scramble to patch a critical vulnerability in Apache Tika has served as a stark reminder of the hidden complexities within our software supply chains. When the initial fix for a flaw in this widely used content analysis tool failed, it exposed a deeper issue—not just in the code, but in

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later