Insights
MCP for Technical Professionals: A Comprehensive Guide to Understanding and Implementing the Model Context Protocol
Table of Contents Foundation & Context Core Concepts Deep Dive MCP vs APIs – The Technical Reality Security & Best Practices Implementation Guide Real-World...
HYPR and Yubico Deepen Partnership to Secure and Scale Passkey Deployment Through Automated Identity Verification
For years, HYPR and Yubico have stood shoulder to shoulder in the mission to eliminate passwords and improve identity security. Yubico’s early and sustained...
Microsoft product roadmap hints at ‘Agentic Users’ with their own M365 licenses
“Our expectation is that it will provide a combination of user-like access to Microsoft 365 services on a monthly/annual/3-annual fee basis plus the core functionality...
Generative AI: The Double-Edged Sword of Cybersecurity
The AI hacking era is here – and it’s reshaping the human risk landscape as we know it. With good and bad actors increasingly...
Crypto-less Crypto Investment Scams: A California Case
My readers will know by now that I am addicted to PACER – the Public Access to Court Electronic Records. When I see headlines...
New Attacks Against Secure Enclaves
Encryption can protect data at rest and data in transit, but does nothing for data in use. What we have are secure enclaves. I’ve...
Trending News
In memoriam: David Harley
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security 07 Nov 2025 • ...
The who, where, and how of APT attacks in Q2 2025–Q3 2025
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report 07 Nov 2025...
ESET APT Activity Report Q2 2025–Q3 2025
ESET ResearchThreat Reports An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025 Jean-Ian...
Sharing is scaring: The WhatsApp screen-sharing scam you didn’t see coming
How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data Christian Ali Bravo 05 Nov 2025 • ,...
How social engineering works | Unlocked 403 cybersecurity podcast (S2E6)
Think you could never fall for an online scam? Think again. Here's how scammers could exploit psychology to deceive you – and what you can...
Ground zero: 5 things to do after discovering a cyberattack
Business Security When every minute counts, preparation and precision can mean the difference between disruption and disaster Phil Muncaster 03 Nov 2025 • , 5...
