Insights
How is the lifecycle of NHIs supported in enterprise environments?
Are You Effectively Managing Your Non-Human Identities? Cybersecurity professionals often grapple with a unique challenge—managing Non-Human Identities (NHIs) or machine identities. These identities, typically...
How can Agentic AI be adaptable to regulatory changes?
Why Is Managing Non-Human Identities Essential in Cloud Security? Non-Human Identities (NHIs) play an instrumental role in modern cybersecurity frameworks. But what exactly constitutes...
Size ≠ Security: Bigger Businesses Still Fail at Bot Protection
One of the perhaps more surprising findings from our Global Bot Security Report 2025 is that when it comes to bot protection, scale does...
Top 7 Strategies for Securing Customer Data While Expanding Your Business Internationally
According to IBM’s Cost of a Data Breach Report 2025, the global average cost of a data breach is over $4.44 million. While this...
Shai-Hulud 2.0: over 14,000 secrets exposed
TL;DR: A new wave of the Shai-Hulud supply chain attack targeting NPM packages, dubbed “The Second Coming” by the threat actors.Key Numbers:– 621 unique...
When the Browser Becomes the Battleground for AI and Last-Mile Attacks
For years we treated the browser as just another application. That era is over. As Vivek Ramachandran points out, the browser has quietly become...
Trending News
The OSINT playbook: Find your weak spots before attackers do
Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots Mario Micucci...
PlushDaemon compromises network devices for adversary-in-the-middle attacks
ESET researchers provide insights into how PlushDaemon performs adversary-in-the-middle attacks using a previously undocumented network implant that we have named EdgeStepper, which redirects all DNS...
What if your romantic AI chatbot can’t keep a secret?
Does your chatbot know too much? Think twice before you tell your AI companion everything. Phil Muncaster 17 Nov 2025 • , 4 min. read...
How password managers can be hacked – and how to stay safe
Digital Security Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe Phil Muncaster...
Why shadow AI could be your biggest security blind spot
Business Security From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company Phil Muncaster 11 Nov...
In memoriam: David Harley
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security 07 Nov 2025 • ...
