• Emerging Threat: The PLAY with OWASSRF

    Executive Summary:First appeared in June 2022, still active and victimizing high-profile targets.Second Highest number of [...]

  • A BOLDMOVE by the Chinese Hackers: Exploiting Fortinet Systems

    By Nilaa Maharjan, Security Research.ContentsKey FindingsWhich Products and Versions are Affected?Making a BOLD statementBoldly going [...]

  • Critical Infrastructure: Securing Police Force Data

    As cybersecurity becomes increasingly vital to the way we manage our computer systems, it's important [...]

  • New Year: New Threats, New Vectors, New Actors

    We’ve all heard the phrase “new year, new me,” but in the world of cybersecurity, [...]

  • Cyber Insurance: Is this the only type of insurance your data, brand, and reputation needs?

    If you’re running a business in 2023, having a watertight cybersecurity infrastructure in place is [...]

  • Uncovering illegitimate Crypto-Mining Activity (Cryptojacking) in the Enterprise: Utilizing Network Logs for Investigation and Remediation

    By Swachchhanda Shrawan Poudel, Security ResearchContentsCrypto mining fast factsThe current landscape of crypto miningHow cyber-miners [...]

  • SAP: What is the SAP migration for 2027?

    SAP is one of the largest software companies in the world, providing enterprise application software [...]

  • What does a CISO need to know about SAP SECURITY?

    by Sükrü ilkel Birakoglu, Senior DirectorSAP Systems had their evolution in years from closed mainframes [...]

  • Crypto mining: Understanding and Protecting Against Cryptojacking

    We take it by now you have heard of crypto currency, so we won’t insult [...]

  • Critical Infrastructure: Protecting Health Service Data

    There are few sectors where privacy is as essential as it is in healthcare. People's [...]

  • Ransomware-as-a-Service (RaaS) – A Growing Threat in Cybersecurity

    In the world of cybersecurity, ransomware-as-a-service (RaaS) has become a growing concern for businesses and [...]

  • Critical Infrastructure: KRITIS and SAP systems

    by Sükrü ilkel Birakoglu, Senior Director With the introduction of the IT Security Act 2.0, the [...]