Endpoint Security

What Cyber Defenses Do Insurers Demand for 2026?
Endpoint & Device Security What Cyber Defenses Do Insurers Demand for 2026?

The stark reality of cyber insurance claims from the first half of 2025 paints an undeniable picture of a threat landscape that has fundamentally changed, forcing a reckoning within the insurance industry. As underwriters and risk assessors recalibrate their models for 2026, a new consensus has

Signed macOS Malware Bypasses Apple's Own Security
Endpoint & Device Security Signed macOS Malware Bypasses Apple's Own Security

With the macOS threat landscape evolving at a breakneck pace, we sat down with Rupert Marais, our in-house security specialist, to dissect a new and particularly deceptive malware strain. This new variant of the MacSync stealer highlights a worrying trend where attackers are successfully using

Trend Analysis: Sophisticated APT Tactics
Endpoint & Device Security Trend Analysis: Sophisticated APT Tactics

The invisible redirection of a single software update request can serve as the unassuming first step in a protracted cyber espionage operation designed to remain undetected for years. A recent, highly sophisticated campaign by the China-linked APT group Evasive Panda highlights this new era of

Is Your AppSec Stack Your Biggest Vulnerability?
Endpoint & Device Security Is Your AppSec Stack Your Biggest Vulnerability?

Imagine the moment a critical zero-day vulnerability is announced, sending shockwaves through the industry and your security team into a frantic race against time. As your engineers scramble to patch systems, they reach out to the multiple security vendors whose tools are supposed to be the bedrock

New Android Malware Merges Stealth, Theft, and Control
Endpoint & Device Security New Android Malware Merges Stealth, Theft, and Control

Today, we're joined by Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security. We'll be delving into the rapidly evolving world of Android malware, exploring a landscape where threat actors are becoming alarmingly sophisticated. Our conversation will

ATM Jackpotting Malware – Review
Endpoint & Device Security ATM Jackpotting Malware – Review

The familiar hum of an ATM dispensing cash has been subverted by a new breed of silent, digital heist that requires no stolen card, only malicious code specifically designed to hijack the machine’s core functions. ATM jackpotting malware represents a significant evolution in financial cybercrime,

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later