Internet Security

WhatsApp Web Hijacked in Brazilian Banking Malware Campaign
Infrastructure & Network Security WhatsApp Web Hijacked in Brazilian Banking Malware Campaign

Rupert Marais, our in-house security specialist, has been tracking a wave of Brazilian banking fraud that weaponizes WhatsApp Web to move laterally at human scale. In this conversation, he unpacks how attackers chain VBS obfuscation, MSI droppers, AutoIt persistence, and Python+Selenium automation

DeepSeek-R1 AI Produces Insecure Code on Sensitive Topics
Endpoint & Device Security DeepSeek-R1 AI Produces Insecure Code on Sensitive Topics

In the rapidly evolving world of artificial intelligence and cybersecurity, few topics are as pressing as the security implications of AI-generated code, especially when influenced by politically sensitive content. Today, we’re speaking with Rupert Marais, our in-house security specialist with deep

How Does Malware Hide in Blender 3D Files for Attacks?
Infrastructure & Network Security How Does Malware Hide in Blender 3D Files for Attacks?

Overview of a Growing Cyber Threat in Creative Software In an era where digital creativity fuels industries worldwide, a startling discovery has emerged: cybercriminals are exploiting trusted 3D modeling software like Blender to deliver devastating malware, targeting unsuspecting users with

TDCJ Pioneers T-Ray Tech for Enhanced Mail Security
Infrastructure & Network Security TDCJ Pioneers T-Ray Tech for Enhanced Mail Security

In the complex and often perilous world of correctional facility management, maintaining security against the influx of contraband remains a persistent challenge for administrators across the nation, and the Texas Department of Criminal Justice (TDCJ), overseeing 87 facilities, has taken a

Critical Windows Flaw Exploitable via Malicious JPEGs
Infrastructure & Network Security Critical Windows Flaw Exploitable via Malicious JPEGs

In an era where digital images are ubiquitous in daily workflows, a newly discovered vulnerability in Microsoft's Windows Graphics Component has sent shockwaves through the cybersecurity community, highlighting the potential for catastrophic breaches via something as innocuous as a JPEG file.

How Does Xerox TriShield 360 Protect SMBs from Cyber Threats?
Infrastructure & Network Security How Does Xerox TriShield 360 Protect SMBs from Cyber Threats?

In an era where cyber threats loom larger than ever, small- and medium-sized businesses (SMBs) often find themselves in a precarious position, lacking the resources and expertise to fend off sophisticated attacks that larger enterprises can more readily combat. Recent studies indicate that over 40%

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later