Insights
USENIX 2025: PEPR ’25 – OneShield Privacy Guard: Deployable Privacy Solutions for LLMs
Creator, Author and Presenter: Shubhi Asthana, IBM Research Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’...
Response to Oracle Security Alert Advisory: Oracle E-Business Suite Pre-Auth RCE (CVE-2025-61882)
On October 4, 2025, Oracle published a Security Alert Advisory addressing the CVE-2025-61882 vulnerability in Oracle E-Business Suite (EBS). This vulnerability allows unauthenticated attackers to...
What is Trust in Cybersecurity? Why Zero Trust Matters
In cybersecurity, “trust” is one of the most misunderstood concepts. Organizations have traditionally relied on perimeter-based defenses, trusting that anything inside their network was legitimate....
Rethinking DDoS Defense: Why Scale Isn’t the Only Metric That Matters
In recent months, headlines have drawn attention to record-breaking DDoS attacks, often measured in terabits per second (Tbps) and accompanied by declarations of network capacity...
Anatomy of a Modern Threat: Deconstructing the Figma MCP Vulnerability
Threat researchers recently disclosed a severe vulnerability in a Figma Model Context Protocol (MCP) server, as reported by The Hacker News. While the specific patch...
USENIX 2025: PEPR ’25 – Breaking Barriers, Not Privacy: Real-World Split Learning Across Healthcare Systems
Creator, Author and Presenter: Sravan Kumar Elineni Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube...
Trending News
Gamaredon X Turla collab
In this blogpost, we uncover the first known cases of collaboration between Gamaredon and Turla, in Ukraine. Key points of this blogpost: In February 2025,...
Small businesses, big targets: Protecting your business against ransomware
Business Security Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises Phil...
HybridPetya: The Petya/NotPetya copycat comes with a twist
HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality 16 Sep 2025 ESET researchers have uncovered a new...
Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass
ESET Research has discovered HybridPetya, on the VirusTotal sample sharing platform. It is a copycat of the infamous Petya/NotPetya malware, adding the capability of compromising...
Are cybercriminals hacking your systems – or just logging in?
Business Security As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door firmly locked...
Preventing business disruption and building cyber-resilience with MDR
Business Security Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy...