Mobile Security

Chinese APT PlushDaemon Hijacks Updates via DNS on Routers
Endpoint & Device Security Chinese APT PlushDaemon Hijacks Updates via DNS on Routers

A quiet edit to trust at the edge Automatic updates were sold as the safest way to stay secure, until a quiet actor rewired that trust at your router and turned routine downloads into covert couriers. The scheme did not smash through vendor gates or crash endpoints; it simply nudged traffic at the

LINE Encryption Flaws Enable Replay, Leaks, and Impersonation
Endpoint & Device Security LINE Encryption Flaws Enable Replay, Leaks, and Impersonation

A messaging platform that anchors payments, banking, and even government services cannot afford security that bends under pressure from routine features, yet new research showed that LINE’s proprietary Letter Sealing v2 fell short on confidentiality, integrity, and authenticity in ways that

Agentic Browser Security – Review
Endpoint & Device Security Agentic Browser Security – Review

In a browser where autonomous agents plan, click, and ship messages in seconds, a single hidden instruction can turn a helpful assistant into a quiet saboteur before anyone notices. That tension defined the debut of agent-enabled browsing, with OpenAI’s ChatGPT Atlas standing front and center as a

Why Is CISA Warning of Spyware in Signal and WhatsApp?
Endpoint & Device Security Why Is CISA Warning of Spyware in Signal and WhatsApp?

Sebastian Raiffen sits down with Rupert Marais, our in-house security specialist known for hands-on work in endpoint and device security, to unpack CISA’s latest alert on spyware and RATs aimed at high-value Signal and WhatsApp users. Rupert traces how attackers braid social engineering with

DeepSeek-R1 AI Produces Insecure Code on Sensitive Topics
Endpoint & Device Security DeepSeek-R1 AI Produces Insecure Code on Sensitive Topics

In the rapidly evolving world of artificial intelligence and cybersecurity, few topics are as pressing as the security implications of AI-generated code, especially when influenced by politically sensitive content. Today, we’re speaking with Rupert Marais, our in-house security specialist with deep

Critical Oracle Identity Manager Flaw Actively Exploited
Endpoint & Device Security Critical Oracle Identity Manager Flaw Actively Exploited

Imagine a scenario where a single flaw in a widely used enterprise tool could compromise the security of countless organizations worldwide, exposing sensitive data to malicious actors. This is the alarming reality facing users of Oracle Identity Manager, a cornerstone for managing user identities

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later