Fraud

Hacked Government Emails Sold on Dark Web for Just $40
Identity & Access Management Hacked Government Emails Sold on Dark Web for Just $40

What if the digital keys to national trust could be bought for less than the price of a night out, revealing a chilling vulnerability in our systems? On the shadowy corners of the dark web, access to active government and law enforcement email accounts—think FBI or local police domains—is being

Predator Jailed for Defrauding Vulnerable Women of Thousands
Identity & Access Management Predator Jailed for Defrauding Vulnerable Women of Thousands

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we’re diving into a chilling case of fraud and emotional manipulation perpetrated by a man who preyed on

How Are Phishing Scams Targeting UK Immigration Sponsors?
Infrastructure & Network Security How Are Phishing Scams Targeting UK Immigration Sponsors?

Introduction Today, we're diving into the murky waters of cybersecurity with Rupert Marais, our in-house security specialist renowned for his expertise in endpoint and device security, cybersecurity strategies, and network management. With a sophisticated phishing scam targeting UK organizations

How Did North Korean Hackers Steal $1.35M in Crypto?
Security Operations & Management How Did North Korean Hackers Steal $1.35M in Crypto?

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with extensive expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we’re diving into a high-profile case involving the alleged theft of over $1 million in cryptocurrency

Corporate Deepfake Threats: Safeguarding the AI Era
Identity & Access Management Corporate Deepfake Threats: Safeguarding the AI Era

In an era where technology evolves at breakneck speed, the emergence of deepfake technology as a corporate cybersecurity threat has sent shockwaves through industries worldwide, posing unprecedented risks to financial stability. These AI-generated synthetic media, encompassing manipulated videos

Fake OAuth App Threats – Review
Identity & Access Management Fake OAuth App Threats – Review

Setting the Stage for a Growing Cybersecurity Crisis Imagine logging into a trusted cloud platform like Microsoft 365, only to receive an urgent email from what appears to be a reputable company like Adobe, requesting access to your account for a routine document signing. Unbeknownst to many, this

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later