Endpoint & Device Security

Trend Analysis: Expanding Botnet Threats
Endpoint & Device Security Trend Analysis: Expanding Botnet Threats

Silently assembling in the digital shadows, a vast and ever-growing army of compromised devices stands ready to launch devastating cyberattacks at a moment's notice. This is the alarming reality of botnets, a persistent threat that has evolved from a simple nuisance into a sophisticated force

Will Orgs Ever Learn From Ivanti EPMM Attacks?
Endpoint & Device Security Will Orgs Ever Learn From Ivanti EPMM Attacks?

The very tools designed to secure the modern enterprise were systematically turned into weapons of mass compromise during the spring and summer of 2025, leaving a trail of breached networks and raising profound questions about the industry's approach to perimeter security. The widespread

What Cyber Defenses Do Insurers Demand for 2026?
Endpoint & Device Security What Cyber Defenses Do Insurers Demand for 2026?

The stark reality of cyber insurance claims from the first half of 2025 paints an undeniable picture of a threat landscape that has fundamentally changed, forcing a reckoning within the insurance industry. As underwriters and risk assessors recalibrate their models for 2026, a new consensus has

Developers Embrace AI as New Security Pitfalls Loom
Endpoint & Device Security Developers Embrace AI as New Security Pitfalls Loom

The rapid integration of artificial intelligence into software development has created an unprecedented surge in productivity, yet beneath this surface of efficiency, a complex and hazardous new security landscape is rapidly taking shape. As development teams race to leverage AI for a competitive

Is Your AppSec Keeping Pace With Modern Threats?
Endpoint & Device Security Is Your AppSec Keeping Pace With Modern Threats?

With his deep expertise in endpoint security and cybersecurity strategy, Rupert Marais has a front-row seat to the evolving battleground of application security. He has spent his career navigating the complex intersection of network management and software development, giving him a unique

Signed macOS Malware Bypasses Apple's Own Security
Endpoint & Device Security Signed macOS Malware Bypasses Apple's Own Security

With the macOS threat landscape evolving at a breakneck pace, we sat down with Rupert Marais, our in-house security specialist, to dissect a new and particularly deceptive malware strain. This new variant of the MacSync stealer highlights a worrying trend where attackers are successfully using

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later