Infrastructure & Network Security

Advanced Phishing Scheme Exploits Google Tools for Attacks
Infrastructure & Network Security Advanced Phishing Scheme Exploits Google Tools for Attacks

Rupert Marais, our in-house Security specialist, dives deep into the intricacies of the recent phishing attack that exploited both Google Sites and DKIM replay tactics. This attack is notable not only for its sophistication but also for the clever manipulation of Google's infrastructure to

How Are Cybercriminals Exploiting AI for Phishing?
Infrastructure & Network Security How Are Cybercriminals Exploiting AI for Phishing?

Artificial intelligence has become a tool exploited by cybercriminals, leading to a new wave of sophisticated phishing schemes. Such attackers are now leveraging AI to design deceptive emails, craft convincing fake websites, and use tools like the Gamma presentation platform to conduct complex

GitLab Releases Critical Security Patches for Major Vulnerabilities
Infrastructure & Network Security GitLab Releases Critical Security Patches for Major Vulnerabilities

The digital landscape has become increasingly perilous as cyber threats evolve in complexity and frequency, necessitating robust security measures from technology companies. GitLab has proactively addressed this challenge by releasing a series of critical security patches for its Community Edition

Snyk Unveils AI-Enhanced DAST Solution for API and Web Security
Infrastructure & Network Security Snyk Unveils AI-Enhanced DAST Solution for API and Web Security

Amid the ever-evolving landscape of software development and cybersecurity, Snyk Ltd. has launched a groundbreaking solution designed to streamline and bolster application security testing. The Snyk API & Web is an AI-enhanced Dynamic Application Security Testing (DAST) solution aimed at

How Safe is Your Cloud? Unpacking Google's Composer Vulnerability
Infrastructure & Network Security How Safe is Your Cloud? Unpacking Google's Composer Vulnerability

In an era where cloud computing has become integral to countless organizations worldwide, the pressing question of security remains at the forefront. Google recently addressed a significant security vulnerability within its Cloud Composer 2 software, an orchestration service based on Apache Airflow

Synology DSM Vulnerability Lets Hackers Read Any File Remotely
Infrastructure & Network Security Synology DSM Vulnerability Lets Hackers Read Any File Remotely

A severe security vulnerability has been identified in Synology’s DiskStation Manager (DSM) software, alarming organizations and individuals who rely on the popular network-attached storage (NAS) solution. This vulnerability enables remote attackers to read arbitrary files through the Network File S

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later