Endpoint Security

Google Reveals Coordinated Cyber Siege on Defense Sector
Endpoint & Device Security Google Reveals Coordinated Cyber Siege on Defense Sector

A newly released analysis from Google's Threat Intelligence Group has meticulously detailed a sustained and highly coordinated multi-vector cyber offensive waged against the global defense industrial base, revealing a complex web of state-sponsored espionage and disruption. The comprehensive report

When Is a Windows Flaw Not a Vulnerability?
Data Protection & Privacy When Is a Windows Flaw Not a Vulnerability?

Today we’re speaking with Rupert Marais, our in-house security specialist, about a series of newly disclosed techniques that turn the humble Windows shortcut, or LNK file, into a surprisingly potent tool for cyberattacks. We'll be exploring the technical nuances of how these shortcuts can be

North Korean Hackers Weaponize VS Code Tunnels
Endpoint & Device Security North Korean Hackers Weaponize VS Code Tunnels

A developer's most trusted toolset can become an adversary's most effective weapon, turning a secure environment for remote collaboration into a hidden backdoor for state-sponsored espionage. This new reality is underscored by a sophisticated campaign where North Korean threat actors have co-opted

eScan Antivirus Update Server Hacked to Spread Malware
Endpoint & Device Security eScan Antivirus Update Server Hacked to Spread Malware

The very shield designed to protect digital environments from threats recently became the conduit for their delivery, as the update servers for eScan antivirus were compromised to distribute a sophisticated, multi-stage malware. A comprehensive analysis of the supply chain attack reveals that

Gartner: AI Data Spurs Need for Zero-Trust Governance
Endpoint & Device Security Gartner: AI Data Spurs Need for Zero-Trust Governance

With us today is Rupert Marais, our in-house security specialist whose expertise spans everything from endpoint security to overarching cybersecurity strategy. We’re diving deep into the seismic shifts AI is causing in data governance and risk management. We'll explore the urgent need for a

Trend Analysis: Cybersecurity as Art Form
Endpoint & Device Security Trend Analysis: Cybersecurity as Art Form

Can destructive code be beautiful? This article explores the paradoxical transformation of malicious software into a profound and tangible art form, a movement re-contextualizing ones and zeros into cultural statements. In an age where digital threats are invisible and abstract, a new wave of

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later