Vulnerabilities & Exploits

ERMAC V3.0 Banking Trojan Source Code Exposed Online
Malware & Threats ERMAC V3.0 Banking Trojan Source Code Exposed Online

In a startling development that has sent ripples through the cybersecurity community, the source code and infrastructure of a highly sophisticated Android banking trojan have been laid bare for all to see on the internet, posing a significant threat to mobile users and financial institutions alike.

Fortinet Software Faces Critical Cybersecurity Threat
Malware & Threats Fortinet Software Faces Critical Cybersecurity Threat

What happens when a guardian of digital safety becomes the target of a ruthless attack? Picture a fortress, built to protect countless organizations, suddenly revealing a hidden crack that invaders are already exploiting. This is the reality for Fortinet, a leading name in network security, now

New HTTP/2 MadeYouReset Flaw Sparks Major DoS Threat
Malware & Threats New HTTP/2 MadeYouReset Flaw Sparks Major DoS Threat

Introduction Welcome to an insightful conversation on the latest cybersecurity threats targeting web protocols. Today, I'm joined by Rupert Marais, our in-house security specialist with extensive expertise in endpoint and device security, cybersecurity strategies, and network management. With the

Charon Ransomware Tactics – Review
Malware & Threats Charon Ransomware Tactics – Review

Imagine a stealthy intruder slipping past the most advanced security systems, targeting critical industries with surgical precision, and leaving behind a trail of encrypted data and operational chaos. This is the reality of Charon ransomware, a newly emerged cyber threat that has redefined the

Fortinet SSL VPN Security – Review
Malware & Threats Fortinet SSL VPN Security – Review

Imagine a sprawling enterprise network, with employees accessing sensitive data from remote locations across the globe, all secured by a single gateway technology. Now picture that gateway under relentless siege by hundreds of malicious actors aiming to breach its defenses. This scenario is not

How Did North Korean Hackers Steal $1.35M in Crypto?
Security Operations & Management How Did North Korean Hackers Steal $1.35M in Crypto?

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with extensive expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we’re diving into a high-profile case involving the alleged theft of over $1 million in cryptocurrency

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later