Rupert Marais, our in-house Security specialist, dives deep into the intricacies of the recent phishing attack that exploited both Google Sites and DKIM replay tactics. This attack is notable not only for its sophistication but also for the clever manipulation of Google's infrastructure to send
Artificial intelligence has become a tool exploited by cybercriminals, leading to a new wave of sophisticated phishing schemes. Such attackers are now leveraging AI to design deceptive emails, craft convincing fake websites, and use tools like the Gamma presentation platform to conduct complex
The digital landscape has become increasingly perilous as cyber threats evolve in complexity and frequency, necessitating robust security measures from technology companies. GitLab has proactively addressed this challenge by releasing a series of critical security patches for its Community Edition
Amid the ever-evolving landscape of software development and cybersecurity, Snyk Ltd. has launched a groundbreaking solution designed to streamline and bolster application security testing. The Snyk API & Web is an AI-enhanced Dynamic Application Security Testing (DAST) solution aimed at addressing
A severe security vulnerability has been identified in Synology’s DiskStation Manager (DSM) software, alarming organizations and individuals who rely on the popular network-attached storage (NAS) solution. This vulnerability enables remote attackers to read arbitrary files through the Network File
Out of all the services targeted by Darktrace, Docker has emerged as the most frequently attacked platform, showcasing an ongoing evolution in cyber threats with new malware strains appearing daily. This article will delve into a distinct malware attack featuring a unique obfuscation method and an