Device Security

How Are Hackers Hijacking Thousands of ASUS Routers Worldwide?
Endpoint & Device Security How Are Hackers Hijacking Thousands of ASUS Routers Worldwide?

What happens when the gateway to your digital world becomes a backdoor for cybercriminals? Right now, tens of thousands of ASUS routers across the globe are being hijacked in a sophisticated operation dubbed Operation WrtHug, catching the attention of cybersecurity experts and exposing a terrifying

Railway Braking Systems Vulnerable to Easy Tampering
Malware & Threats Railway Braking Systems Vulnerable to Easy Tampering

Today, we’re diving into the critical and often overlooked world of operational technology security with Rupert Marais, our in-house security specialist. With deep expertise in endpoint and device security, cybersecurity strategies, and network management, Rupert has dedicated years to uncovering

Slack Security Vulnerabilities – Review
Endpoint & Device Security Slack Security Vulnerabilities – Review

In an era where corporate communication hinges on digital platforms, Slack stands as a linchpin for millions of users worldwide, facilitating seamless collaboration across industries. Yet, with over 10 million daily active users sharing sensitive data through its channels, a staggering reality

Microsoft Patch Tuesday – Review
Endpoint & Device Security Microsoft Patch Tuesday – Review

In an era where cyber threats loom larger than ever, with global ransomware attacks costing enterprises billions annually, a single unpatched vulnerability can spell disaster for organizations relying on Microsoft systems. The November Patch Tuesday update, a monthly ritual for IT administrators,

The Hidden Risks of Non-Human Identities in SaaS Ecosystems
Endpoint & Device Security The Hidden Risks of Non-Human Identities in SaaS Ecosystems

What happens when the most trusted entities in a company's digital landscape aren't even human? In today's SaaS-driven world, countless operations are powered by non-human identities (NHIs)—think AI assistants, automation bots, and API tokens. These invisible forces streamline workflows and boost

How Does Samsung Knox Secure the Open Android Ecosystem?
Endpoint & Device Security How Does Samsung Knox Secure the Open Android Ecosystem?

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. With a particular focus on the Android ecosystem and Samsung Knox technologies, Rupert is here to unpack how this

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later