Cloud Security

Is VoidLink a New Class of Linux Cloud Malware?
Security Operations & Management Is VoidLink a New Class of Linux Cloud Malware?

Today we’re speaking with Rupert Marais, our in-house security specialist, to unpack a deeply concerning development in the world of cybersecurity. A newly discovered malware framework, dubbed VoidLink, is poised to change how we think about threats to Linux systems. Far from a simple script, this

CISA Flags Unpatched Gogs Flaw Under Active Attack
Infrastructure & Network Security CISA Flags Unpatched Gogs Flaw Under Active Attack

The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding a high-severity vulnerability in the Gogs self-hosted Git service, confirming that the flaw is being actively exploited in the wild with no official patch currently available for administrators. The

Can a QR Code Defeat Multi-Factor Authentication?
Infrastructure & Network Security Can a QR Code Defeat Multi-Factor Authentication?

The deceptively simple black-and-white squares known as QR codes have become so integrated into daily life that scanning one feels almost reflexive, yet this familiarity is now being weaponized in sophisticated cyberattacks that challenge the very foundations of modern digital security. The U.S.

ChatGPT Zero-Click Attacks – Review
Infrastructure & Network Security ChatGPT Zero-Click Attacks – Review

The very capability that makes modern AI assistants indispensable—their autonomous connection to our personal data streams—has quietly opened a new and almost invisible front in the war on cybersecurity. The evolution of Large Language Models into agentic AI, capable of interacting with external

Microsoft Warns of Flaw Enabling Internal Phishing Attacks
Infrastructure & Network Security Microsoft Warns of Flaw Enabling Internal Phishing Attacks

When an email from a trusted internal colleague is not what it seems, the very foundation of organizational communication security begins to crumble under the weight of a sophisticated new threat. Microsoft Threat Intelligence has brought to light a critical vulnerability that allows malicious

AI Zero Trust Detects Attacks Without Files
Endpoint & Device Security AI Zero Trust Detects Attacks Without Files

Today, we're joined by Rupert Marais, an in-house Security Specialist whose work focuses on the sharp edge of cybersecurity: endpoint protection, strategic defense, and advanced network management. In our conversation, we will explore the shadowy world of modern, fileless attacks that traditional

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later