Endpoint & Device Security

Signed macOS Malware Bypasses Apple's Own Security
Endpoint & Device Security Signed macOS Malware Bypasses Apple's Own Security

With the macOS threat landscape evolving at a breakneck pace, we sat down with Rupert Marais, our in-house security specialist, to dissect a new and particularly deceptive malware strain. This new variant of the MacSync stealer highlights a worrying trend where attackers are successfully using

Trend Analysis: Sophisticated APT Tactics
Endpoint & Device Security Trend Analysis: Sophisticated APT Tactics

The invisible redirection of a single software update request can serve as the unassuming first step in a protracted cyber espionage operation designed to remain undetected for years. A recent, highly sophisticated campaign by the China-linked APT group Evasive Panda highlights this new era of

Is Your AppSec Stack Your Biggest Vulnerability?
Endpoint & Device Security Is Your AppSec Stack Your Biggest Vulnerability?

Imagine the moment a critical zero-day vulnerability is announced, sending shockwaves through the industry and your security team into a frantic race against time. As your engineers scramble to patch systems, they reach out to the multiple security vendors whose tools are supposed to be the bedrock

Trend Analysis: Healthcare Cybersecurity Regulation
Endpoint & Device Security Trend Analysis: Healthcare Cybersecurity Regulation

A digital siege is underway in American healthcare, forcing a high-stakes confrontation between federal regulators aiming to fortify defenses and the providers who argue those defenses are operationally unbuildable. The healthcare sector is in a state of high alert, caught between escalating

New Android Malware Merges Stealth, Theft, and Control
Endpoint & Device Security New Android Malware Merges Stealth, Theft, and Control

Today, we're joined by Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security. We'll be delving into the rapidly evolving world of Android malware, exploring a landscape where threat actors are becoming alarmingly sophisticated. Our conversation will

ATM Jackpotting Malware – Review
Endpoint & Device Security ATM Jackpotting Malware – Review

The familiar hum of an ATM dispensing cash has been subverted by a new breed of silent, digital heist that requires no stolen card, only malicious code specifically designed to hijack the machine’s core functions. ATM jackpotting malware represents a significant evolution in financial cybercrime,

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later