Mobile Security

Will Orgs Ever Learn From Ivanti EPMM Attacks?
Endpoint & Device Security Will Orgs Ever Learn From Ivanti EPMM Attacks?

The very tools designed to secure the modern enterprise were systematically turned into weapons of mass compromise during the spring and summer of 2025, leaving a trail of breached networks and raising profound questions about the industry's approach to perimeter security. The widespread

Trend Analysis: Sophisticated APT Tactics
Endpoint & Device Security Trend Analysis: Sophisticated APT Tactics

The invisible redirection of a single software update request can serve as the unassuming first step in a protracted cyber espionage operation designed to remain undetected for years. A recent, highly sophisticated campaign by the China-linked APT group Evasive Panda highlights this new era of

Is Your AppSec Stack Your Biggest Vulnerability?
Endpoint & Device Security Is Your AppSec Stack Your Biggest Vulnerability?

Imagine the moment a critical zero-day vulnerability is announced, sending shockwaves through the industry and your security team into a frantic race against time. As your engineers scramble to patch systems, they reach out to the multiple security vendors whose tools are supposed to be the bedrock

New Android Malware Merges Stealth, Theft, and Control
Endpoint & Device Security New Android Malware Merges Stealth, Theft, and Control

Today, we're joined by Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security. We'll be delving into the rapidly evolving world of Android malware, exploring a landscape where threat actors are becoming alarmingly sophisticated. Our conversation will

ATM Jackpotting Malware – Review
Endpoint & Device Security ATM Jackpotting Malware – Review

The familiar hum of an ATM dispensing cash has been subverted by a new breed of silent, digital heist that requires no stolen card, only malicious code specifically designed to hijack the machine’s core functions. ATM jackpotting malware represents a significant evolution in financial cybercrime,

Advanced Malware Spreads via YouTube and Cracked Software
Endpoint & Device Security Advanced Malware Spreads via YouTube and Cracked Software

The seemingly harmless search for a free software license or a helpful video tutorial is increasingly becoming the digital tripwire that unleashes sophisticated cyberattacks into unsuspecting networks. In a landscape where threat actors continuously refine their methods, recent investigations have

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later