Data Breach & Theft

How Did Vishing Lead to the Crunchbase Data Breach?
Data Protection & Privacy How Did Vishing Lead to the Crunchbase Data Breach?

In the wake of a sophisticated cyberattack campaign that compromised major players like Crunchbase, SoundCloud, and Betterment, we sat down with our in-house security specialist, Rupert Marais. With deep expertise in endpoint security and cyber strategy, Rupert helps us understand the intricate web

How Is AI Fueling the GoBruteforcer Botnet?
Endpoint & Device Security How Is AI Fueling the GoBruteforcer Botnet?

Today, we're joined by Rupert Marais, our in-house security specialist with deep expertise in endpoint security and cyber defense strategies. We’ll be diving into the anatomy of the GoBruteforcer botnet, a threat that highlights a startling intersection of modern development practices and

Is Your LastPass Account at Risk From This Phishing Scam?
Data Protection & Privacy Is Your LastPass Account at Risk From This Phishing Scam?

A meticulously crafted deception campaign is now preying on the trust users place in their digital password managers, demanding immediate attention from anyone safeguarding their online life within a LastPass vault. This sophisticated phishing attack underscores a fundamental truth of

LastPass Users Targeted in New Master Password Phishing Scam
Malware & Threats LastPass Users Targeted in New Master Password Phishing Scam

We're joined by our in-house security specialist, Rupert Marais, to dissect the latest phishing campaign targeting LastPass users. This attack leverages a potent mix of urgency and social engineering, a timely reminder of the persistent threats facing password manager users. We'll explore the

System Guard Secure Launch – Review
Data Protection & Privacy System Guard Secure Launch – Review

Firmware, the foundational software that gives life to hardware, has increasingly become a prime target for attackers seeking undetectable persistence on a system. This review will explore the evolution of System Guard Secure Launch, its key features, performance metrics, and its impact on securing

Researchers Hack StealC Panel to Unmask Malware Operators
Data Protection & Privacy Researchers Hack StealC Panel to Unmask Malware Operators

In an unprecedented reversal of roles within the shadowy world of cybercrime, security researchers have successfully turned a potent info-stealing malware’s own infrastructure against its operators by exploiting a critical vulnerability. This strategic infiltration of the StealC malware platform

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later