Email Security

APT28 Targets European Entities in Phishing Campaign
Infrastructure & Network Security APT28 Targets European Entities in Phishing Campaign

With us today is Rupert Marais, our in-house Security Specialist, whose work in endpoint security and cyber strategy gives him a frontline view of the evolving threat landscape. We're delving into the persistent and cunning tactics of state-sponsored groups, specifically the Russian-linked APT28,

Is Your Office 365 Setup an Open Door for Phishers?
Data Protection & Privacy Is Your Office 365 Setup an Open Door for Phishers?

With the corporate world more interconnected than ever, the humble email inbox has become the primary battleground for cybersecurity. We sat down with Rupert Marais, our in-house security specialist, to dissect a troubling trend where attackers exploit misconfigurations in Office 365 to impersonate

Microsoft Warns of Flaw Enabling Internal Phishing Attacks
Infrastructure & Network Security Microsoft Warns of Flaw Enabling Internal Phishing Attacks

When an email from a trusted internal colleague is not what it seems, the very foundation of organizational communication security begins to crumble under the weight of a sophisticated new threat. Microsoft Threat Intelligence has brought to light a critical vulnerability that allows malicious

NZ Launches Inquiry Into Health Data Breach
Infrastructure & Network Security NZ Launches Inquiry Into Health Data Breach

A digital file holding a person's most confidential medical history is a record built on absolute trust, a trust now shattered for over 100,000 New Zealanders. The government has launched a formal review after a major cyberattack on the health platform ManageMyHealth. This incident prompts an

Lewiston Fraud Allegations Trigger Federal Probe
Infrastructure & Network Security Lewiston Fraud Allegations Trigger Federal Probe

A convergence of local controversies that have simmered for months in Lewiston, Maine, has now erupted into a full-scale federal investigation, drawing a clear line from city hall to the U.S. Department of Homeland Security and signaling a dramatic escalation in scrutiny. What began as whispers of

Trend Analysis: Weaponized Cloud Automation
Infrastructure & Network Security Trend Analysis: Weaponized Cloud Automation

The very tools designed to streamline business operations and enhance productivity are now being systematically turned against organizations by threat actors with unprecedented precision. In an era where cloud automation drives business efficiency, malicious actors have turned this powerful tool

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later