The stark reality of cyber insurance claims from the first half of 2025 paints an undeniable picture of a threat landscape that has fundamentally changed, forcing a reckoning within the insurance industry. As underwriters and risk assessors recalibrate their models for 2026, a new consensus has
With the macOS threat landscape evolving at a breakneck pace, we sat down with Rupert Marais, our in-house security specialist, to dissect a new and particularly deceptive malware strain. This new variant of the MacSync stealer highlights a worrying trend where attackers are successfully using
The invisible redirection of a single software update request can serve as the unassuming first step in a protracted cyber espionage operation designed to remain undetected for years. A recent, highly sophisticated campaign by the China-linked APT group Evasive Panda highlights this new era of
Imagine the moment a critical zero-day vulnerability is announced, sending shockwaves through the industry and your security team into a frantic race against time. As your engineers scramble to patch systems, they reach out to the multiple security vendors whose tools are supposed to be the bedrock
Today, we're joined by Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security. We'll be delving into the rapidly evolving world of Android malware, exploring a landscape where threat actors are becoming alarmingly sophisticated. Our conversation will
The familiar hum of an ATM dispensing cash has been subverted by a new breed of silent, digital heist that requires no stolen card, only malicious code specifically designed to hijack the machine’s core functions. ATM jackpotting malware represents a significant evolution in financial cybercrime,
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27