Data Privacy & Security

Scam Clothing Sites Misuse Home Addresses for Returns
Identity & Access Management Scam Clothing Sites Misuse Home Addresses for Returns

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we're diving into a troubling trend in online scams, specifically how fraudulent clothing websites are

TikTok Videos Spread Malware via ClickFix Cyber Attacks
Data Protection & Privacy TikTok Videos Spread Malware via ClickFix Cyber Attacks

Defining the Purpose of This Guide This how-to guide is designed to equip users with the knowledge and tools necessary to safeguard their digital security against a growing cyberthreat: malware distribution through TikTok videos using ClickFix attacks. By following the detailed steps and advice

How Is Cl0p Ransomware Exploiting Oracle EBS Vulnerabilities?
Data Protection & Privacy How Is Cl0p Ransomware Exploiting Oracle EBS Vulnerabilities?

In a chilling wave of cybercrime sweeping across global organizations, a sophisticated ransomware group known as Cl0p has zeroed in on vulnerabilities within Oracle’s E-Business Suite (EBS), a critical enterprise management solution used by countless businesses. This alarming campaign, linked to

Fax Virus Hoax Sparks Reply-All Fiasco and Job Loss
Infrastructure & Network Security Fax Virus Hoax Sparks Reply-All Fiasco and Job Loss

As we delve into the quirky and sometimes chaotic world of late '90s tech, I'm thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. With years of experience navigating the

Harvard Hit by Oracle EBS Zero-Day Hack: First Victim?
Data Protection & Privacy Harvard Hit by Oracle EBS Zero-Day Hack: First Victim?

What happens when an institution as revered as Harvard University becomes the target of a ruthless cyberattack, exposing over 1.3 terabytes of sensitive data to the dark web, and sending shockwaves through academia and the corporate world alike? This startling breach, linked to a zero-day

Threat Hunting: Turning Awareness into Cyber Readiness
Infrastructure & Network Security Threat Hunting: Turning Awareness into Cyber Readiness

In the ever-evolving world of cybersecurity, staying ahead of threats requires more than just awareness—it demands proactive strategies and innovative thinking. Today, we’re thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later