Insights

When Proxies Become the Attack Vectors in Web Architectures

Many Reverse proxy attack vectors expose a flawed assumption in modern web architectures that backends can blindly trust security-critical headers from upstream reverse proxies....

IO River Embraces Wasm to Enable Any WAF to Run on Any CDN

IO River this week revealed it is leveraging the portable WebAssembly (Wasm) binary instruction format to make it possible to deploy any web application...

Destructive Activity Targeting Stryker Highlights Emerging Supply Chain Risks

Blogs Blog In this post, we examine the disruptive cyber activity targeting Stryker, potential links to the Handala persona, and what the incident signals...

Reuse, Reward: How Banks Can Safely Unlock the Value of Their Data

The financial world is awash with data. But too few organizations are able to use it effectively. In Bank Director’s 2025 Technology Survey, one-third...

The Threat Within: How Intelligent Detection Prevented a Potential Internal Malware Incident

Executive Overview Organizations often focus heavily on defending their perimeter against external attackers. Firewalls, threat intelligence feeds, and intrusion prevention systems are designed to...

Post-Quantum Cryptography for Authentication: The Enterprise Migration Guide 2026

Imagine a classified government file, encrypted today with RSA-2048, containing diplomatic communications that will remain sensitive for the next 20 years. A sophisticated nation-state...

Trending News

Sednit reloaded: Back in the trenches

Since April 2024, Sednit’s advanced development team has reemerged with a modern toolkit centered on two paired implants, BeardShell and Covenant, each using a different...

What cybersecurity actually does for your business

Business Security The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed...

How SMBs use threat research and MDR to build a defensive edge

Corporate IT and security teams have the unenviable task of keeping relentless and increasingly sophisticated adversaries at bay. They’re often faced with limited resources and...

Protecting education: How MDR can tip the balance in favor of schools

Business Security The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response...

This month in security with Tony Anscombe – February 2026 edition

In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools 28 Feb 2026...

Mobile app permissions (still) matter more than you may think

Mobile Security Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious...