ChannelLife Canada - Industry insider news for technology resellers

Steganography stories

Realistic email inbox with magnifying glass revealing hidden malicious code in image attachment phishing

Phishing kits & steganography drive new wave of email threats

Fri, 14th Nov 2025
#
steganography
Cybersecurity experts warn of rising email threats as phishing kits Tycoon 2FA and Cephas evolve, using steganography and code obfuscation to evade detection.
Complex tangled network of code lines morphing into shadowy virus

Malware complexity soars 127% as older defences miss threats

Fri, 8th Aug 2025
#
steganography
Malware complexity has surged 127% as legacy defences miss threats, revealing one in fourteen ‘safe’ files was actually malicious, OPSWAT reports.
Ps image005

Australia faces surge in AI-powered cyber threats & espionage

Fri, 20th Jun 2025
#
steganography
Australia faces a rise in AI-driven cyber threats and state-sponsored espionage, calling for stronger defences and intelligence-led cybersecurity strategies.
Ps erich kron

Malicious memes: How cybercriminals use humour to spread malware

Thu, 22nd May 2025
#
steganography
Cybercriminals exploit viral memes to spread malware and phishing attacks, using humour to bypass defences and target millions online in Australia and beyond.
Phishing  1

Secure Web Gateways cannot protect you from phishing attacks

Wed, 25th Sep 2024
#
steganography
Secure Web Gateways fall short against modern phishing attacks, highlighting the need for browser-native security solutions to protect enterprises.
Hiding in plain sight

Hiding in plain sight – How attackers conceal malware in everyday web resources

Fri, 13th Sep 2024
#
steganography
Cyber attackers are concealing malware in everyday web resources like images, WebAssembly, and JavaScript, evading Secure Web Gateways, researchers at SquareX reveal.
Clearswift sponsored story image

Data loss prevention: Why digital images should not be overlooked

Tue, 8th Oct 2019
#
steganography
Digital images are increasingly being used as mechanisms for cyber-attacks. What can organisations to minimise risks and mitigate against this advanced threat?.