Network Security

The Good, the Bad and the Ugly in Cybersecurity – Week 13

The Good | Interpol Cracks Down on 300 Cybercriminals Linked to African Cyber Scam Operations 306 suspects have been arrested in Operation Red Card, an international crackdown conducted between November 2024 and February 2025 on cybercrime networks operating across borders. The joint operation between Interpol and African law enforcement seized 1842 devices linked to mobile

The Good, the Bad and the Ugly in Cybersecurity – Week 13 Read More »

GPU Device Plugins | Unveiling Risks in Kubernetes Workloads

GPU device plugins in Kubernetes have become indispensable for artificial intelligence (AI) and machine learning (ML) workloads. They enable seamless integration of graphics processing unit (GPU) resources, accelerating computationally heavy tasks such as model training, real-time inference, and big-data processing. As organizations scale their AI and ML operations, these plugins simplify resource management while maximizing

GPU Device Plugins | Unveiling Risks in Kubernetes Workloads Read More »

ReaderUpdate Reforged | Melting Pot of macOS Malware Adds Go to Crystal, Nim and Rust Variants

ReaderUpdate is a macOS malware loader platform that, despite having been in the wild since at least 2020, has passed relatively unnoticed by many vendors and remains widely undetected. A report in 2023 observed that ReaderUpdate infections were contiguous with but distinct from WizardUpdate (aka UpdateAgent, Silver Toucan) infections and seen to deliver Genieo (aka

ReaderUpdate Reforged | Melting Pot of macOS Malware Adds Go to Crystal, Nim and Rust Variants Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 12

The Good | CISA Updates Its KEV Catalog, Reminding Users to Prioritize Patch Management CISA has added three newly exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, calling out the urgency of patching security flaws to keep organizations protected from active exploits. The first vulnerability, CVE-2025-1316 (critical severity), affects Edimax IC-7100 IP Cameras. This

The Good, the Bad and the Ugly in Cybersecurity – Week 12 Read More »

Dragon RaaS | Pro-Russian Hacktivist Group Aims to Build on “The Five Families” Cybercrime Reputation

Dragon RaaS is a ransomware group that walks the line between hacktivism and cybercrime. Also known as DragonRansom or Dragon Team, it emerged in July 2024 as an offshoot of the Stormous group, itself part of a larger cybercrime syndicate known as “The Five Families,” which includes ThreatSec, GhostSec, Blackforums, and SiegedSec. While Dragon RaaS

Dragon RaaS | Pro-Russian Hacktivist Group Aims to Build on “The Five Families” Cybercrime Reputation Read More »

Build Physical Security Superpowers with Smart Bullet Cameras and Multi-Imagers

How is your current physical security deployment doing? We consistently hear about cybersecurity threats looming in our increasingly digital spaces. Yet the breaches happening in our physical spaces—breaches that directly affect our people, places, and things—are just as prominent. In fact, 23% of chief security officers rate theft of company physical property as one of

Build Physical Security Superpowers with Smart Bullet Cameras and Multi-Imagers Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 11

The Good | Garantex Crypto Exchange Seized & Switzerland Launches New Cyberattack Reporting Rule While on vacation, things took a sharp turn for Aleksej Besciokov, the co-founder and a key administrator of the Russian crypto exchange Garantex. The Lithuanian national and Russian resident, also known online as “proforg” and “iram”, was apprehended under India’s extradition

The Good, the Bad and the Ugly in Cybersecurity – Week 11 Read More »

CyberLaw Forum 2025 | Navigating Security Risks & Actioning Resilience

This year’s Charleston CyberLaw Forum gathered top legal experts, cybersecurity professionals, and insurance leaders to tackle the complex challenges shaping the world today. Hosted in collaboration with the Charleston School of Law, the event featured thought-provoking discussions on the global threat landscape, responsible AI usage, supply chain vulnerabilities, and regulatory shifts that are impacting both

CyberLaw Forum 2025 | Navigating Security Risks & Actioning Resilience Read More »