Threat Intelligence & Prevention

Chinese Hackers Hijack Notepad++ Updates for Espionage
Infrastructure & Network Security Chinese Hackers Hijack Notepad++ Updates for Espionage

Today we’re speaking with Rupert Marais, our in-house security specialist, about a recent and particularly insidious cyberattack. A state-sponsored group known as Lotus Blossom is believed to have hijacked the update mechanism of the widely-used text editor, Notepad++, to deploy a sophisticated new

Are You Safe From Botnets, Zero-Days, and AI Hijacks?
Infrastructure & Network Security Are You Safe From Botnets, Zero-Days, and AI Hijacks?

In a world where digital threats evolve by the minute, staying ahead requires more than just software updates; it demands deep, forward-looking expertise. We're joined today by Rupert Marais, our in-house security specialist whose work at the intersection of endpoint security and network defense

SmarterMail Security Vulnerabilities – Review
Malware & Threats SmarterMail Security Vulnerabilities – Review

The foundational trust placed in enterprise email servers can obscure the significant and evolving threats that target them, turning a vital communication tool into a critical point of failure. SmarterMail represents a significant platform in the email and collaboration server sector. This review

Experts Say Agentic AI Will Dominate 2026 Cyber Threats
Malware & Threats Experts Say Agentic AI Will Dominate 2026 Cyber Threats

A recent poll of cybersecurity professionals has solidified a stark reality for the industry, revealing a dramatic consensus that the nature of cyber warfare is fundamentally changing. The rapid and often insecure integration of autonomous technologies has created an unprecedented attack surface,

Is Your Ivanti EPMM Safe From New Zero-Day Attacks?
Malware & Threats Is Your Ivanti EPMM Safe From New Zero-Day Attacks?

In a significant alert for cybersecurity professionals, Ivanti has disclosed two critical zero-day vulnerabilities within its Endpoint Manager Mobile (EPMM) solution that are being actively exploited in the wild, compelling an urgent response from organizations that rely on the platform. The

Attackers Weaponize Zoom Display Names for Phishing
Malware & Threats Attackers Weaponize Zoom Display Names for Phishing

A security notification arrives from a trusted source like Zoom, carrying a message so urgent it bypasses your usual skepticism—but the real danger is cleverly embedded within the sender's name itself. This scenario is not hypothetical; it represents a sophisticated new frontier in phishing where

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later