Newsroom

Cyber resilience lessons from recent attacks
29 September 2025

Cyberattack Disrupts Major European Airports: What Happened and How to Respond
22 September 2025

The new iPhone 17 and why we need (more than ever) a Secure and Independent Mobile OS
12 September 2025

Negotiating with Cybercriminals: The Comprehensive Playbook
07 September 2025

Zero Trust: Why this cybersecurity model matters now more than ever
28 August 2025

Is Google’s live voice translation opening the door to impersonation threats?
23 August 2025
Threats

The thin line between insider risk and harmless anomalies
19 August 2025
ThreatsRisk

The Rise of Cybercriminality in Asia
13 August 2025
Asia

Ransomware Groups Now Targeting Cloud Backups: Inside Their Playbook and Real-World Cases
11 August 2025
Ransomware

Boardroom Breach: A One-Hour Crisis Meeting
07 August 2025
Guide

From awareness to action: why most security training still fails
06 August 2025
Training

CVEs still matter — but they must become more agile
01 August 2025
Strategy

Conducting a Comprehensive Web Application Penetration Test
29 July 2025
GuidePenTest

From “Dr. No” to Business Enabler: Understanding CISO Types and Qualities
26 July 2025
Management

Mastering SharePoint Online Security: A Comprehensive Guide for IT Administrators
24 July 2025
GuideSharePoint

Pay2Key ransomware returns: Iranian-linked group targets financial and energy sectors in new wave
23 July 2025
Ransomware

Operation Red Echo: China-linked hackers extend their reach into African government networks
22 July 2025
AfricaChinaSharePoint