Malware & Threats

New ZeroDayRAT Malware Sells Nation-State Spying Tools
Malware & Threats New ZeroDayRAT Malware Sells Nation-State Spying Tools

We're joined today by Rupert Marais, our in-house security specialist, to discuss an alarming new trend in mobile threats. A new form of spyware, dubbed ZeroDayRAT, is being sold openly on platforms like Telegram, essentially packaging sophisticated surveillance tools for a mass-market criminal

Ransomware Exploit Chaining – Review
Malware & Threats Ransomware Exploit Chaining – Review

The catastrophic cascade of a network-wide security breach can often be traced back to a single, forgotten server left vulnerable by an oversight in routine maintenance. Ransomware exploit chaining represents a significant advancement in offensive cybersecurity tactics. This review will explore the

Is a New Fortinet SSO Flaw Putting Your Firewall at Risk?
Malware & Threats Is a New Fortinet SSO Flaw Putting Your Firewall at Risk?

Federal authorities and cybersecurity researchers are raising the alarm over a critical vulnerability in Fortinet's FortiCloud single sign-on service that is not just theoretical but is being actively exploited in the wild. This significant security flaw, tracked as CVE-2026-24858, creates a

AI Discovers Hundreds of Unknown Security Flaws
Malware & Threats AI Discovers Hundreds of Unknown Security Flaws

A recent breakthrough from the AI safety and research company Anthropic has fundamentally altered the cybersecurity landscape, demonstrating an artificial intelligence model that can autonomously discover and detail hundreds of previously unknown, high-severity vulnerabilities in critical software.

Cyber Threats Escalate With AI Hacks and Record DDoS Attacks
Malware & Threats Cyber Threats Escalate With AI Hacks and Record DDoS Attacks

Today, we're joined by Rupert Marais, our in-house security specialist whose extensive experience in endpoint security and network management gives him a unique perspective on the evolving threat landscape. In our conversation, we will explore the forces behind the recent surge in massive DDoS

Stealth Malware and Infrastructure Attacks Dominate Threats
Malware & Threats Stealth Malware and Infrastructure Attacks Dominate Threats

The digital battleground has fundamentally shifted, with adversaries now favoring the quiet, methodical infiltration of networks over loud, disruptive assaults. This strategic evolution signifies a dangerous new era in cybersecurity, where the primary goal is not immediate chaos but long-term,

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later