What threats are you missing?

Are traditional security methods enough?

Stay up to date with the SecureValue Blog

Most Recent Articles

Google to Require Developer Verification Even for Sideloaded Apps

Starting in 2026, all apps on certified Android devices will have to come from verified developers, and that includes distribution through official stores and sideloading.

Sideloading apps onto Android devices is a key strength of the OS. You can inst…

AppSuite PDF Editor Backdoor: A Detailed Technical Analysis

Some threat actors are bold enough to submit their own malware as false positive to antivirus companies and demand removal of the detection. This is exactly what happened with AppSuite PDF Editor. Initially, automation flagged it as a potentially unwan…

Cybercriminals Exploit Anthropic’s AI in Global Extortion Campaign

Anthropic warns of a turning point in AI-fueled cybercrime after its Claude Code tool was misused in large-scale extortion attacks.

AI weaponization flourishes

In a new report, AI company Anthropic has revealed that a cybercrime gang hijacked its po…

How Small Craft Businesses Can Stay Secure Online

Running a small craft business, whether as a painter, artisan, or workshop owner, is hard work. While juggling client orders, keeping track of invoices, and managing social media accounts, you’re also responsible for handling sensitive information such…

Why Data Sovereignty Matters More Than Ever in a Cloud-First World

Who’s minding your company’s data, and how? If it’s generated in one country but processed in another, then you most likely have data sovereignty concerns.  Do you know whether your data storage and handling, including security, adhere to the laws gove…

Enterprise IoT Security for Smart Offices

Smart offices, whether big or small, are only as secure as the connected items you let through the door.

Why smart offices raise the stakes

Smart lighting, conference systems, printers, badge readers, cameras, vending machines and HVAC sensors have …