Endpoint Security

Strengthening OT Security: Embrace Zero Trust and PAM Strategies
Identity & Access Management Strengthening OT Security: Embrace Zero Trust and PAM Strategies

Operational Technology (OT) systems have evolved significantly from isolated setups to interconnected networks that demand advanced security measures. As OT infrastructures increasingly integrate with Information Technology (IT) systems, businesses must adopt robust security strategies to safeguard

How Are Cybercriminals Advancing Ransomware Tactics?
Malware & Threats How Are Cybercriminals Advancing Ransomware Tactics?

The landscape of cybersecurity has experienced unprecedented shifts recently, largely due to the evolving tactics and sophisticated tools employed by cybercriminals. This field research delves into key developments in ransomware operations, examining the methods these threat actors use to bypass

Has RedCurl Transformed From Espionage to Ransomware Warfare?
Malware & Threats Has RedCurl Transformed From Espionage to Ransomware Warfare?

In a noteworthy shift in the landscape of cyber threats, RedCurl, a notorious Russian-speaking hacking group traditionally known for corporate espionage, has recently turned its focus to ransomware deployment. This transformation marks a significant evolution in their operational tactics and poses

Google's $32B Acquisition of Wiz to Boost Cloud and AI Security
Infrastructure & Network Security Google's $32B Acquisition of Wiz to Boost Cloud and AI Security

Rupert Marais is our in-house Security specialist with expertise in endpoint and device security, cybersecurity strategies, and network management. In today's interview, we will discuss the recent announcement about Google's acquisition of the cybersecurity firm Wiz for $32 billion. We

How Will WatchGuard's FireCloud Enhance Hybrid Network Security?
Infrastructure & Network Security How Will WatchGuard's FireCloud Enhance Hybrid Network Security?

Russell Fairweather is joined by Rupert Marais, our in-house security specialist with expertise in endpoint and device security, cybersecurity strategies, and network management. This interview will delve into WatchGuard's new FireCloud Internet Access product, its features, benefits for

Akira Ransomware Group Exploits Webcams to Bypass EDR and Encrypt Files
Infrastructure & Network Security Akira Ransomware Group Exploits Webcams to Bypass EDR and Encrypt Files

In 2024, cybercriminals have become increasingly innovative, leveraging more sophisticated techniques to infiltrate corporate networks and evade security measures. Among these malicious actors, the Akira ransomware group stood out, responsible for approximately 15% of the cybersecurity incidents

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later