Endpoint Security

How Did Hackers Breach Hundreds of Salesforce Customers?
Data Protection & Privacy How Did Hackers Breach Hundreds of Salesforce Customers?

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with a wealth of experience in endpoint and device security, cybersecurity strategies, and network management. Today, we’re diving into a recent, alarming data theft campaign targeting hundreds of Salesforce customers,

How Can Companies Prevent Insider Cyber Threats Like Lu's?
Endpoint & Device Security How Can Companies Prevent Insider Cyber Threats Like Lu's?

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with a wealth of expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we're diving into the high-profile case of Davis Lu, a software engineer who sabotaged his former

OneFlip: AI Threat That Could Crash Cars and Fool Security
Endpoint & Device Security OneFlip: AI Threat That Could Crash Cars and Fool Security

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we're diving into the emerging threat of OneFlip, a sophisticated attack that targets AI systems by flipping a

Elastic Denies Zero-Day Flaw Claims in Defend EDR Product
Endpoint & Device Security Elastic Denies Zero-Day Flaw Claims in Defend EDR Product

In the ever-evolving landscape of cybersecurity, where threats lurk in the shadows of every digital interaction, a recent controversy has emerged involving Elastic, a prominent player in endpoint security solutions. Reports surfaced from a cybersecurity research entity alleging a critical zero-day

Chinese Silk Typhoon Hackers Target North American Sectors
Endpoint & Device Security Chinese Silk Typhoon Hackers Target North American Sectors

In an era where digital landscapes are as contested as physical borders, a formidable cyber threat has emerged from the shadows, targeting critical North American industries with alarming precision. A Chinese state-sponsored hacking group, known as Silk Typhoon and tracked by cybersecurity experts

Arch Linux Under Siege: DDoS Attack Hits Second Week
Security Operations & Management Arch Linux Under Siege: DDoS Attack Hits Second Week

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. With Arch Linux currently under a sustained DDoS attack now entering its second week, Rupert is here to shed light on

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later