IoT Security

Microsoft Patches Three Zero-Days, One Under Active Attack
Endpoint & Device Security Microsoft Patches Three Zero-Days, One Under Active Attack

In the fast-paced world of cybersecurity, staying ahead of threats is a constant battle. This month’s security updates from Microsoft are a stark reminder of that reality, with patches for 56 flaws, including one being actively exploited and two publicly known zero-days. To help us decipher the

Google Patches Chrome Flaw Under Active Exploit
Endpoint & Device Security Google Patches Chrome Flaw Under Active Exploit

The familiar act of opening a web browser can unwittingly expose users to sophisticated threats operating silently in the background, a reality brought into sharp focus by Google's latest emergency security patch for a critical vulnerability. This guide serves to break down the nature of this

Analysts Warn Humanoid Robots Are Unsecured by Design
Endpoint & Device Security Analysts Warn Humanoid Robots Are Unsecured by Design

As the world stands on the cusp of an automated revolution, with advanced humanoid robots poised to integrate into factories, homes, and public spaces, a stark warning from cybersecurity analysts casts a long shadow over this promising future. Beneath the polished chrome and sophisticated

Copilot's No-Code AI Can Leak Sensitive Company Data
Endpoint & Device Security Copilot's No-Code AI Can Leak Sensitive Company Data

The rapid democratization of artificial intelligence through intuitive, no-code platforms is empowering employees to innovate at an unprecedented scale, yet this very accessibility has introduced a severe, often invisible, security risk that traditional corporate defenses are not equipped to

Are Gogs Servers Under Widespread Zero-Day Attack?
Endpoint & Device Security Are Gogs Servers Under Widespread Zero-Day Attack?

We're joined today by Rupert Marais, our in-house security specialist, to dissect a critical zero-day vulnerability currently under active and widespread exploitation. The flaw, found in the popular self-hosted Git service Gogs, stems from an incomplete patch for a previous issue, allowing

Storm-0249 Abuses EDR for Undetected Attacks
Endpoint & Device Security Storm-0249 Abuses EDR for Undetected Attacks

In an alarming evolution of cybercrime tactics, threat actors are now weaponizing the very security tools designed to protect enterprise networks, turning digital guardians into unwitting accomplices for stealthy infiltration. This research summary delves into the activities of the Initial Access

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later