News

Privacy Engineering in a Post AI World

AI tools are pretty much everywhere these days, and barely

Seven Essential Strategies to Prevent and Detect Business Email Compromise

While sophisticated Business Email Compromise attacks require advanced defences, implementing

The Hidden Privacy Risk in Commercial VPN Services: Root Certificate Installation

Introduction As a cybersecurity professional who routinely investigates Business Email

Next.js Vulnerability - CVE-2025-29927

Another day, another vulnerability in a web framework. H0wever due

We need to talk about your backups

Backups aren't cool, they aren't sexy and they're often ignored. Unfortunately inadequate backup strategies can have a devastating effect on your business.