On 24 April 2025, the protection of children codes of
Privacy Engineering in a Post AI World
AI tools are pretty much everywhere these days, and barely
Seven Essential Strategies to Prevent and Detect Business Email Compromise
While sophisticated Business Email Compromise attacks require advanced defences, implementing
The Hidden Privacy Risk in Commercial VPN Services: Root Certificate Installation
Introduction
As a cybersecurity professional who routinely investigates Business Email
Next.js Vulnerability - CVE-2025-29927
Another day, another vulnerability in a web framework. H0wever due
We need to talk about your backups
Backups aren't cool, they aren't sexy and they're often ignored. Unfortunately inadequate backup strategies can have a devastating effect on your business.