Endpoint & Device Security

How Does Qilin Use Linux Ransomware on Windows Hosts?
Endpoint & Device Security How Does Qilin Use Linux Ransomware on Windows Hosts?

The cybersecurity landscape is under siege, with ransomware groups like Qilin redefining the boundaries of digital threats by targeting a wide range of organizations. This Russian-speaking cybercriminal organization has disrupted over 700 organizations across 62 countries, exploiting a startling

How Did CL0P Hackers Exploit Oracle Software Flaws?
Endpoint & Device Security How Did CL0P Hackers Exploit Oracle Software Flaws?

In a world where enterprise software underpins the operations of countless organizations, a single overlooked flaw can unleash chaos, and this year, dozens of companies across the globe faced a chilling reality when a critical vulnerability in Oracle’s E-Business Suite (EBS) became the gateway for

Microsoft Rushes Emergency Patch for Critical Windows Bug
Endpoint & Device Security Microsoft Rushes Emergency Patch for Critical Windows Bug

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we're diving into the urgent topic of Microsoft's emergency patch for a critical Windows Server bug, known as

IoT Evolution: From Consumer Gadgets to Security Threats
Endpoint & Device Security IoT Evolution: From Consumer Gadgets to Security Threats

Imagine a world where a simple smart speaker in your living room could become a gateway for a cyberattack on a national scale, or where a connected thermostat might inadvertently aid in disrupting an energy grid. This scenario is no longer the stuff of science fiction but a pressing reality as the

Can Quantum-Resistant Chips Secure U.S. Defense Future?
Endpoint & Device Security Can Quantum-Resistant Chips Secure U.S. Defense Future?

As the digital landscape evolves at a breakneck pace, the specter of quantum computing looms large over U.S. defense systems, threatening to dismantle the very encryption that safeguards national security, spurring a groundbreaking partnership between SEALSQ Corp. (NASDALAES) and Trusted

Pwn2Own Highlights Persistent Software Security Flaws
Endpoint & Device Security Pwn2Own Highlights Persistent Software Security Flaws

In a world where technology evolves at a breakneck pace, the persistence of fundamental security flaws in software remains a glaring concern, as vividly demonstrated by the latest Pwn2Own hacking competition held in Ireland. This annual event, orchestrated by Trend Micro's Zero Day Initiative

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later