System Security

Critical Security Flaw in Roundcube: Update Now
Infrastructure & Network Security Critical Security Flaw in Roundcube: Update Now

Roundcube Webmail has become one of the most widely adopted email clients globally, integrated seamlessly into esteemed web hosting solutions like cPanel, Plesk, ISPConfig, and DirectAdmin. Unfortunately, this popularity makes it a magnet for cyber threats. In recent developments, a severe security

How Do Cyberattackers Exploit EDR Vulnerabilities?
Endpoint & Device Security How Do Cyberattackers Exploit EDR Vulnerabilities?

A novel cyberattack technique named "Bring Your Own Installer" has been identified, exploiting vulnerabilities within SentinelOne's Endpoint Detection and Response (EDR) product. Uncovered by Stroz Friedberg, part of Aon, this method bypasses the EDR's anti-tamper features

Microsoft Halts Windows Insider Builds Due to Critical System Bug
Infrastructure & Network Security Microsoft Halts Windows Insider Builds Due to Critical System Bug

What if the latest software update on your computer suddenly disabled key functions that you rely on daily? For Windows Insider Program participants, this was not hypothetical. A critical system bug in Microsoft's latest Canary build prompted an immediate halt in further releases, affecting

Are You Prepared for Evolving Cyber Threats?
Malware & Threats Are You Prepared for Evolving Cyber Threats?

In today's digital landscape, cybersecurity is more critical than ever as cyber threats grow in sophistication and frequency, necessitating constant vigilance and adaptation by individuals and organizations. These threats do not discriminate, affecting everyone from individual users to global

Is Your Business at Risk from SAP NetWeaver Flaw?
Data Protection & Privacy Is Your Business at Risk from SAP NetWeaver Flaw?

In today's digital landscape, where businesses rely heavily on integrated systems for operational efficiency, a recent critical security vulnerability has emerged in SAP NetWeaver Visual Composer, known as CVE-2025-31324. This flaw, identified as an unauthenticated file upload vulnerability

How Are Attackers Exploiting Windows Task Scheduler Flaws?
Malware & Threats How Are Attackers Exploiting Windows Task Scheduler Flaws?

Rupert Marais, our in-house Security specialist, brings extensive expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we delve into the multifaceted vulnerabilities discovered in the Windows task scheduling service, a critical component frequently

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later