Endpoint Security

Mustang Panda Hits India’s Banks With LotusLite Espionage
Malware & Threats Mustang Panda Hits India’s Banks With LotusLite Espionage

Lead A routine help-desk email slid into an Indian banker’s inbox, draped in the language of support and stamped with quiet urgency, and the single click it invited masked a backdoor disguised as banking software while opening a covert channel tailored for spies rather than thieves. The ruse leaned

UNC6692 Abuses AWS and Browser Add-Ons to Steal Credentials
Identity & Access Management UNC6692 Abuses AWS and Browser Add-Ons to Steal Credentials

Market Context and Why It Matters Mailbox storms no longer signal mere annoyance; they now mask credential raids staged through cloud trust, browser add-ons, and scripts that look benign until they quietly seize the keys to the company. The surge in collaboration platforms and sanctioned cloud

Can PhantomRPC Turn Local Access Into SYSTEM on Windows?
Endpoint & Device Security Can PhantomRPC Turn Local Access Into SYSTEM on Windows?

Rupert Marais has spent years in the trenches of Windows defense and incident response, with a focus on endpoint hardening, device security, and network controls. In this conversation, he unpacks how an architectural blind spot in RPC can let a low-privileged process ride a legitimate connection

Is Windows 11’s Second-Chance Setup a Dark Pattern?
Endpoint & Device Security Is Windows 11’s Second-Chance Setup a Dark Pattern?

Lead: The Surprise Setup That Wouldn’t Stay Finished Few phrases on a corporate PC triggered more anxiety than a chipper banner announcing “You’re almost done setting up your PC,” surfacing months after the actual setup had been completed and right when a user needed to get work done. The timing

Did a PowerPoint Prank Trap PCs in an Endless Loop?
Endpoint & Device Security Did a PowerPoint Prank Trap PCs in an Endless Loop?

Rupert Marais is our in-house Security specialist with deep, hands-on experience in endpoint and device security, cybersecurity strategy, and network management. He’s worked through the quirks of Windows NT and Windows 95 to today’s modern builds, coaching teams through pranks that turned into

Will ClickFix Let Lazarus Hijack Your macOS Sessions?
Identity & Access Management Will ClickFix Let Lazarus Hijack Your macOS Sessions?

Back-to-back meetings blur into a single rush when a trusted name on Telegram insists a quick Terminal paste will rescue a failing call, nudging macOS users to trade caution for speed at the exact moment a thief needs only one click. That is the opening the ClickFix technique exploits: it turns the

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later