Cybercrime

Advanced Phishing Scheme Exploits Google Tools for Attacks
Infrastructure & Network Security Advanced Phishing Scheme Exploits Google Tools for Attacks

Rupert Marais, our in-house Security specialist, dives deep into the intricacies of the recent phishing attack that exploited both Google Sites and DKIM replay tactics. This attack is notable not only for its sophistication but also for the clever manipulation of Google's infrastructure to send

How Are Cybercriminals Exploiting AI for Phishing?
Infrastructure & Network Security How Are Cybercriminals Exploiting AI for Phishing?

Artificial intelligence has become a tool exploited by cybercriminals, leading to a new wave of sophisticated phishing schemes. Such attackers are now leveraging AI to design deceptive emails, craft convincing fake websites, and use tools like the Gamma presentation platform to conduct complex

Can Stolen Cryptocurrency Be Recovered in 2025?
Infrastructure & Network Security Can Stolen Cryptocurrency Be Recovered in 2025?

Sebastian Raiffen recently sat down with Rupert Marais, an in-house Security specialist with expertise in endpoint and device security, cybersecurity strategies, and network management. They discussed the surge in cryptocurrency theft, the methods used by hackers, and ways to recover stolen assets.

How Did a Cyberattack on Morocco Expose Socioeconomic Disparities?
Data Protection & Privacy How Did a Cyberattack on Morocco Expose Socioeconomic Disparities?

A recent cyberattack on Morocco’s social security database has garnered significant attention, revealing gaps in cybersecurity and socioeconomic inequalities within the nation. The breach, linked to hackers allegedly from Algeria, has intensified geopolitical tensions and shed light on the

How to Find Legitimate Crypto Recovery Services for Lost Funds
Malware & Threats How to Find Legitimate Crypto Recovery Services for Lost Funds

Have you ever faced the panic of realizing your hard-earned cryptocurrency is locked away due to a scam or a technical mishap? This gut-wrenching moment leaves many wondering if they'll ever see their digital assets again. One might assume that crypto's decentralized nature protects from such

Healthcare Sector Faces Advanced Email Cyberattacks in 2025
Infrastructure & Network Security Healthcare Sector Faces Advanced Email Cyberattacks in 2025

Healthcare organizations have increasingly become lucrative targets for cybercriminals due to the vast amounts of sensitive data they manage. The email threat landscape has grown more sophisticated, posing significant risks to patient data, financial transactions, and regulatory compliance. This

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later