Internet Security

How Does GhostFrame Redefine Phishing with Stealthy IFrames?
Infrastructure & Network Security How Does GhostFrame Redefine Phishing with Stealthy IFrames?

Imagine opening an email that looks like a routine HR update, only to unknowingly surrender your credentials to a hidden trap buried deep within the code. This isn’t a far-fetched scenario but a stark reality in today’s cybersecurity landscape, where sophisticated phishing frameworks like

How Are AI-Orchestrated Cyberattacks Changing Security?
Data Protection & Privacy How Are AI-Orchestrated Cyberattacks Changing Security?

In the rapidly evolving world of cybersecurity, few topics are as pressing as the role of artificial intelligence in both orchestrating and defending against cyber threats. Today, we’re sitting down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device

WhatsApp Web Hijacked in Brazilian Banking Malware Campaign
Infrastructure & Network Security WhatsApp Web Hijacked in Brazilian Banking Malware Campaign

Rupert Marais, our in-house security specialist, has been tracking a wave of Brazilian banking fraud that weaponizes WhatsApp Web to move laterally at human scale. In this conversation, he unpacks how attackers chain VBS obfuscation, MSI droppers, AutoIt persistence, and Python+Selenium automation

DeepSeek-R1 AI Produces Insecure Code on Sensitive Topics
Endpoint & Device Security DeepSeek-R1 AI Produces Insecure Code on Sensitive Topics

In the rapidly evolving world of artificial intelligence and cybersecurity, few topics are as pressing as the security implications of AI-generated code, especially when influenced by politically sensitive content. Today, we’re speaking with Rupert Marais, our in-house security specialist with deep

How Does Malware Hide in Blender 3D Files for Attacks?
Infrastructure & Network Security How Does Malware Hide in Blender 3D Files for Attacks?

Overview of a Growing Cyber Threat in Creative Software In an era where digital creativity fuels industries worldwide, a startling discovery has emerged: cybercriminals are exploiting trusted 3D modeling software like Blender to deliver devastating malware, targeting unsuspecting users with

TDCJ Pioneers T-Ray Tech for Enhanced Mail Security
Infrastructure & Network Security TDCJ Pioneers T-Ray Tech for Enhanced Mail Security

In the complex and often perilous world of correctional facility management, maintaining security against the influx of contraband remains a persistent challenge for administrators across the nation, and the Texas Department of Criminal Justice (TDCJ), overseeing 87 facilities, has taken a

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later