• Hacker as a Service: What is HaaS?

    Cybersecurity has become a major concern for businesses and individuals alike. With the increasing amount [...]

  • Russia V Ukraine: Round two – Gamma Edition

    A year on since the first attack on Ukrainian territory and the unofficial beginning of [...]

  • Critical Infrastructure: Financial Data

    Cybersecurity is an essential practice for safeguarding data within business-critical systems and applications.Criminals are likely [...]

  • PCI-DSS: Cybersecurity and the Payment Card Industry

    PCI-DSS is a set of security standards designed to ensure that all companies that accept, [...]

  • Long-term resilience – Driven by innovative leadership

    Cybersecurity used to be seen as a less-than-necessary investment. Business leaders were of the opinion [...]

  • Compliance: Public trading companies in USA to report cyber incidents to the SEC

    The US Securities and Exchange Commission (SEC) is expected to finalize rules in April 2023 [...]

  • Emerging Threat: The PLAY with OWASSRF

    Executive Summary:First appeared in June 2022, still active and victimizing high-profile targets.Second Highest number of [...]

  • A BOLDMOVE by the Chinese Hackers: Exploiting Fortinet Systems

    By Nilaa Maharjan, Security Research.ContentsKey FindingsWhich Products and Versions are Affected?Making a BOLD statementBoldly going [...]

  • Critical Infrastructure: Securing Police Force Data

    As cybersecurity becomes increasingly vital to the way we manage our computer systems, it's important [...]

  • New Year: New Threats, New Vectors, New Actors

    We’ve all heard the phrase “new year, new me,” but in the world of cybersecurity, [...]

  • Cyber Insurance: Is this the only type of insurance your data, brand, and reputation needs?

    If you’re running a business in 2023, having a watertight cybersecurity infrastructure in place is [...]

  • Uncovering illegitimate Crypto-Mining Activity (Cryptojacking) in the Enterprise: Utilizing Network Logs for Investigation and Remediation

    By Swachchhanda Shrawan Poudel, Security ResearchContentsCrypto mining fast factsThe current landscape of crypto miningHow cyber-miners [...]