Cybercrime

Google Uncovers Apps Hijacking Devices for Cybercrime
Infrastructure & Network Security Google Uncovers Apps Hijacking Devices for Cybercrime

Today we’re speaking with Rupert Marais, our in-house security specialist, about a threat that turns the very devices we trust into tools for cybercrime. We'll be exploring the shadowy world of illicit proxy networks, like the recently dismantled IPIDEA operation, which co-opted millions of user

Flawed Sicarii Ransomware Can't Be Decrypted
Endpoint & Device Security Flawed Sicarii Ransomware Can't Be Decrypted

In the ever-evolving landscape of cyber threats, a new ransomware strain named Sicarii has emerged, not for its sophistication, but for its catastrophic incompetence. To unpack the bizarre nature of this malware, we sat down with Rupert Marais, our in-house security specialist. With deep expertise

Critical Grist Flaw Allows RCE via Spreadsheet Formulas
Malware & Threats Critical Grist Flaw Allows RCE via Spreadsheet Formulas

The unassuming grid of a spreadsheet rarely conjures images of a cybersecurity breach, yet a critical vulnerability recently uncovered in the Grist platform demonstrates how a single formula can become a potent weapon for remote code execution. A severe flaw identified in Grist-Core, the

How Did Vishing Lead to the Crunchbase Data Breach?
Data Protection & Privacy How Did Vishing Lead to the Crunchbase Data Breach?

In the wake of a sophisticated cyberattack campaign that compromised major players like Crunchbase, SoundCloud, and Betterment, we sat down with our in-house security specialist, Rupert Marais. With deep expertise in endpoint security and cyber strategy, Rupert helps us understand the intricate web

Are Your Dev Tools a Gateway for Attackers?
Malware & Threats Are Your Dev Tools a Gateway for Attackers?

The very tools meticulously crafted to accelerate innovation and streamline software development are now being systematically turned into covert channels for espionage and sabotage, fundamentally challenging the trust developers place in their daily workflows. A series of sophisticated attacks

Are Hackers Using Tax Scams to Bypass Your Antivirus?
Malware & Threats Are Hackers Using Tax Scams to Bypass Your Antivirus?

An official-looking email from the tax department lands in an inbox, complete with logos and formal language, yet it conceals a sophisticated cyber weapon designed to dismantle digital defenses from within. This research summary analyzes a sophisticated cyber espionage campaign targeting Indian

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later