The silent infiltration of the npm registry during the Sha1-Hulud incident sent a definitive shockwave through the open-source community, proving that trust in a package name alone was no longer a viable security strategy. In an ecosystem where millions of developers rely on interconnected
We're joined today by Rupert Marais, our in-house security specialist, to discuss an alarming new trend in mobile threats. A new form of spyware, dubbed ZeroDayRAT, is being sold openly on platforms like Telegram, essentially packaging sophisticated surveillance tools for a mass-market criminal
The rapid expansion of connected technology has introduced a new class of devices, from immersive extended reality (XR) headsets to smart home hubs and industrial sensors, that often lack a traditional screen. This evolution presents a significant challenge to modern security practices,
The enterprise landscape is rapidly embracing ARM64-based devices for their remarkable gains in performance and power efficiency, heralding a new chapter in mobile productivity and workforce flexibility. While this technological evolution promises significant advantages, it simultaneously
The most dangerous threats in cybersecurity are often not the ones that announce their presence with a bang, but those that whisper their way past defenses hidden within the most mundane of digital artifacts. A sophisticated malware campaign, dubbed Shadow#Reactor, has brought this concept to the
Today, we're joined by Rupert Marais, our in-house security specialist with deep expertise in endpoint security and network management. We're diving into the recent Fortinet zero-day vulnerability, CVE-2026-24858, a critical issue that sent ripples through the security community. Our conversation
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24