Frans Majair

Frans Majair

Data Protection Expert

Frans Majair is a renowned cybersecurity expert. He writes about the importance of data protection regulations on security practices, cybersecurity insurance, and step-by-step guides on preparing for and responding to data breaches, among other topics. He condenses these learnings into various snackable content pieces, for all audiences interested in learning about hackers, threats, and business perspectives. 

Hackers & Threats How Is APT28 Hijacking Routers to Steal Credentials?

The rapid proliferation of interconnected office hardware has inadvertently created a vast and often neglected attack surface for sophisticated state-sponsored groups. Cyber-espionage operations conducted by the threat actor known as APT28 have recently reached a new level of persistence by

How Is APT28 Hijacking Routers to Steal Credentials?
Hackers & Threats DeepLoad and Kiss Loader Use AI and Native Tools to Evade EDR

Modern cybersecurity defenses are currently facing a formidable challenge as threat actors increasingly integrate sophisticated artificial intelligence and native system utilities to bypass even the most advanced endpoint detection and response solutions. The recent emergence of the DeepLoad

DeepLoad and Kiss Loader Use AI and Native Tools to Evade EDR
Hackers & Threats CTRL Remote Access Toolkit – Review

Modern cybersecurity defenses often fail not because they lack raw power but because they are tuned for the wrong frequencies of malicious activity. This vulnerability is perfectly exploited by the CTRL Remote Access Toolkit, a Russian-origin threat that represents a fundamental shift in how

CTRL Remote Access Toolkit – Review
Hackers & Threats Hackers Use AitM and SVG Files to Bypass Corporate Security

Modern cybersecurity defenses often struggle against the sophisticated convergence of human-centric social engineering and the technical exploitation of legitimate web infrastructure to compromise high-value corporate accounts. In the current landscape of 2026, threat actors have refined

Hackers Use AitM and SVG Files to Bypass Corporate Security
Hackers & Threats Is Patching Enough to Stop Critical Cisco Zero-Day Attacks?

Malik Haidar is a seasoned cybersecurity veteran who has navigated the high-stakes world of multinational corporate defense for years. With a deep focus on merging technical intelligence with business resilience, he has spent his career dismantling the strategies of sophisticated threat actors to

Is Patching Enough to Stop Critical Cisco Zero-Day Attacks?
Hackers & Threats MSHTML Framework Exploitation – Review

The persistence of legacy code within modern operating systems creates a paradoxical landscape where advanced defenses coexist with decades-old vulnerabilities that remain ripe for exploitation. While Microsoft has pushed toward Chromium-based rendering, the MSHTML framework continues to underpin

MSHTML Framework Exploitation – Review
Hackers & Threats BeyondTrust Remote Access Security – Review

Modern enterprise perimeters have fundamentally shifted from static firewalls to dynamic identity-based gateways that must balance seamless accessibility with uncompromising defensive postures in an increasingly hostile global threat environment. This review explores the evolution of BeyondTrust

BeyondTrust Remote Access Security – Review
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address