Internet Security

How Did ShadyPanda Hackers Target Millions of Browsers?
Security Operations & Management How Did ShadyPanda Hackers Target Millions of Browsers?

Diving into the dark underbelly of browser security, I’m thrilled to sit down with Rupert Marais, our in-house security specialist with a wealth of expertise in endpoint and device security, cybersecurity strategies, and network management. With a staggering 4.3 million Chrome and Edge users

Why Did Cloudflare Face Another Outage During Maintenance?
Infrastructure & Network Security Why Did Cloudflare Face Another Outage During Maintenance?

Imagine a vast digital highway, carrying 20% of the world’s web traffic, suddenly grinding to a halt during what should have been routine upkeep. This scenario unfolded on December 5, when Cloudflare, a linchpin of internet infrastructure, faced yet another service disruption. For businesses and

How Does GhostFrame Redefine Phishing with Stealthy IFrames?
Infrastructure & Network Security How Does GhostFrame Redefine Phishing with Stealthy IFrames?

Imagine opening an email that looks like a routine HR update, only to unknowingly surrender your credentials to a hidden trap buried deep within the code. This isn’t a far-fetched scenario but a stark reality in today’s cybersecurity landscape, where sophisticated phishing frameworks like

How Are AI-Orchestrated Cyberattacks Changing Security?
Data Protection & Privacy How Are AI-Orchestrated Cyberattacks Changing Security?

In the rapidly evolving world of cybersecurity, few topics are as pressing as the role of artificial intelligence in both orchestrating and defending against cyber threats. Today, we’re sitting down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device

WhatsApp Web Hijacked in Brazilian Banking Malware Campaign
Infrastructure & Network Security WhatsApp Web Hijacked in Brazilian Banking Malware Campaign

Rupert Marais, our in-house security specialist, has been tracking a wave of Brazilian banking fraud that weaponizes WhatsApp Web to move laterally at human scale. In this conversation, he unpacks how attackers chain VBS obfuscation, MSI droppers, AutoIt persistence, and Python+Selenium automation

DeepSeek-R1 AI Produces Insecure Code on Sensitive Topics
Endpoint & Device Security DeepSeek-R1 AI Produces Insecure Code on Sensitive Topics

In the rapidly evolving world of artificial intelligence and cybersecurity, few topics are as pressing as the security implications of AI-generated code, especially when influenced by politically sensitive content. Today, we’re speaking with Rupert Marais, our in-house security specialist with deep

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later