Identity & Access Management

Scam Clothing Sites Misuse Home Addresses for Returns
Identity & Access Management Scam Clothing Sites Misuse Home Addresses for Returns

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we're diving into a troubling trend in online scams, specifically how fraudulent clothing websites are

Akira Ransomware Targets SonicWall VPNs in Major Campaign
Identity & Access Management Akira Ransomware Targets SonicWall VPNs in Major Campaign

In a disturbing surge of cyber threats sweeping through the digital landscape, a sophisticated ransomware strain known as Akira has zeroed in on SonicWall VPN customers, orchestrating a vast and relentless campaign that has been active since at least mid-July 2023, with evidence of malicious

Iranian Hackers Exploit SSL.com Certificates for Malware
Identity & Access Management Iranian Hackers Exploit SSL.com Certificates for Malware

In a disturbing turn of events that has sent ripples through the cybersecurity community, Iranian state-sponsored hackers, identified as UNC1549, have been uncovered using digital certificates from SSL.com, a Houston-based certificate authority, to sign malicious software with alarming success.

How Did a £28M Timeshare Fraud Devastate Thousands?
Identity & Access Management How Did a £28M Timeshare Fraud Devastate Thousands?

What happens when a dream of endless vacations turns into a financial nightmare for thousands of vulnerable people across the UK? Picture an elderly couple, having saved for decades, hoping to offload a burdensome timeshare, only to lose everything to a polished scam promising salvation. This is

BBC Exposes £28M Timeshare Fraud with Secret Filming
Identity & Access Management BBC Exposes £28M Timeshare Fraud with Secret Filming

Imagine a promise of endless sunny vacations turning into a suffocating financial burden, draining life savings with no escape in sight, a nightmare that became reality for thousands of unsuspecting timeshare owners. For these victims, the dream of holiday freedom morphed into a trap as they fell

Which ATO Protection Tools Lead in 2025 Cybersecurity?
Identity & Access Management Which ATO Protection Tools Lead in 2025 Cybersecurity?

In the dynamic and ever-evolving digital landscape of 2025, businesses across sectors such as e-commerce, banking, healthcare, and software-as-a-service (SaaS) face an unrelenting threat from account takeover (ATO) attacks, which are often executed through credential stuffing, phishing, and

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later