Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Featured Post

Data Protection Day 2025: insights from experts

In 2025, organisations are facing unprecedented privacy challenges due to the rise of generative AI and increased cloud adoption. Ahead of Data Protection Day 2025 on January 28th, we've compiled the thoughts of a number of data privacy and security experts to examine best practices when it comes to data protection for the year ahead.

How to Turn on Guided Access on Android Devices?

Do you ever wish you could lock your Android device to a single app or restrict specific functions for a more focused and secure experience? Guided Access can make it happen. This blog will guide you through everything you need to know about enabling Guided Access for Android devices, its benefits, and how miniOrange MDM can take it to the next level.

DeepSeek: The Silent AI Takeover That Could Cripple Markets and Fuel China's Cyberwarfare

Unlike Western AI systems governed by privacy laws and ethical considerations, DeepSeek operates under a regime notorious for state-sponsored hacking, surveillance, and cyber espionage. With AI-driven automation at its disposal, China can rapidly scale its cyberattacks, embedding malware, manipulating financial markets, and eroding trust in global AI platforms.

Adventures in monitoring a hostile network: Black Hat Europe 2024

Working in the network operating center (NOC) at Black Hat Europe, we’re never quite sure what we’re going to see. The anxiousness I feel there is similar to what I’d experience when I was blue-teaming for a corporate network. I could prepare all I wanted, read all the blogs about the current threat trends people and companies were tracking on the Internet, and review all the red team and vulnerability scanner reports to identify likely targets.

Microsoft is Still the Most Commonly Impersonated Brand in Phishing Attacks

Microsoft, Apple, and Google were the most commonly impersonated brands in phishing attacks last quarter, according to researchers at Check Point. “Microsoft retained its dominance as the most imitated brand in phishing schemes, accounting for a staggering 32% of all attempts,” Check Point says. “Apple followed with 12%, while Google ranked third. Notably, LinkedIn reentered the list at fourth place, emphasizing the persistent targeting of technology and Social Network brands.

Using Genuine Business Domains and Legitimate Services to Harvest Credentials

A KnowBe4 Threat Lab Publication Authors: Jeewan Singh Jalal, Anand Bodke, and Martin Kraemer Executive Summary The KnowBe4 Threat Lab analyzed a sophisticated phishing campaign targeting multiple organizations to harvest Microsoft credentials. Threat actors utilized a compromised domain, its subdomains, bulk email services, and open redirect vulnerability to evade detection and increase click success rates.

Why you need to secure your digital supply chain in 2025

Digital supply chain attacks are happening more often, inflicting widespread damage and threatening your future operations. Here’s one simple solution. How would you know if your digital supply chain is under attack? From aerospace and defense projects to engineering and infrastructure programs, modern manufacturing processes rely on digital supply chains. These interconnected cloud highways streamline production workflows and improve efficiency across the supply chain.