Threat news
A selection of our blogs alerting information security professionals to new and emerging threats.

Featured Blog
TikTok alternative, RedNote, leaking user data-
Feb 27, 2025 · 4 min read
No Filter – Part Two
Read moreSpear phishing attacks take advantage of gaps is network, application and browser protetctions Successfully blocking malicious links is the fundamental…
-
Jan 21, 2025 · 4 min read
TikTok alternative, RedNote, leaking user data
Read moreTikTok alternative, Xiaohonghsu, transmitting user data in plaintext. The news that Donald Trump has intervened to keep TikTok accessible for…
-
Oct 10, 2024 · 6 min read
No Filter – Part One
Read moreSpear phishing exposes the ‘mobile gap’ in enterprise defenses. Spear phishing is one of the most effective, widely deployed, and…
-
Aug 8, 2024 · 4 min read
Stealing secrets – the menace of mobile RAT’s
Read moreSmartphones infected with Remote Access Trojans are a critical risk for enterprise security Remote Access Trojans (RATs) have plagued Android…
-
Jul 22, 2024 · 5 min read
MFA Bypass – Stealing Cookies
Read moreHow Adversary-in-the-Middle attacks undermine multi-factor authentication According to Verizon’s authoritative Data Breach Investigation Report, 90% of data breaches start by…
-
Jul 12, 2024 · 6 min read
Pegasus, Predator, Hermit Spyware – NSO and its clones
Read moreRise in known exploits point to the proliferation of sophisticated cyber-surveillance tools targeting iOS and Android devices. The recent revelation…