Endpoint Security

RealDefense Launches $10M SmartScan Fund for Cyber Partners
Endpoint & Device Security RealDefense Launches $10M SmartScan Fund for Cyber Partners

What happens when businesses struggle to protect users from escalating cyber threats while also chasing sustainable revenue? In today’s digital battleground, where data breaches impact millions annually, a staggering 60% of companies report financial strain from balancing security and

Sysadmin Fixes Hospital CT Scanner with Simple Cable Hack
Infrastructure & Network Security Sysadmin Fixes Hospital CT Scanner with Simple Cable Hack

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with a wealth of expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we’re diving into a fascinating story from the field of IT problem-solving in a hospital setting. Rupert

New HTTP/2 MadeYouReset Flaw Sparks Major DoS Threat
Malware & Threats New HTTP/2 MadeYouReset Flaw Sparks Major DoS Threat

Introduction Welcome to an insightful conversation on the latest cybersecurity threats targeting web protocols. Today, I'm joined by Rupert Marais, our in-house security specialist with extensive expertise in endpoint and device security, cybersecurity strategies, and network management. With the

Uncovering Salesforce Security Gaps with Dual Testing Layers
Endpoint & Device Security Uncovering Salesforce Security Gaps with Dual Testing Layers

Imagine a sprawling digital fortress, housing an organization’s most sensitive data and critical operations, yet harboring hidden cracks that could collapse its defenses in an instant. This is the reality for many businesses relying on Salesforce, a platform that has transformed from a simple CRM

How Are Phishing Scams Targeting UK Immigration Sponsors?
Infrastructure & Network Security How Are Phishing Scams Targeting UK Immigration Sponsors?

Introduction Today, we're diving into the murky waters of cybersecurity with Rupert Marais, our in-house security specialist renowned for his expertise in endpoint and device security, cybersecurity strategies, and network management. With a sophisticated phishing scam targeting UK organizations

How Can Linux Webcams Become Persistent Cyber Threats?
Endpoint & Device Security How Can Linux Webcams Become Persistent Cyber Threats?

Imagine a seemingly harmless webcam perched on your desk, silently recording your every move, only to transform into a relentless cyber weapon capable of reinfecting your system no matter how many times you wipe it clean. This chilling scenario became a focal point at this year's DEF CON hacker

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later