Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Changing how we think about technology - moving from logical to critical thinking

Knowledge is power, but it is only as powerful as the way organisations implement what they’ve learned and the subsequent decisions they make. All too often there is a flaw in thinking, in that we tend to be quite tactical and short-term; often we don’t approach problems from a holistic perspective, or we spend too little time considering alternative strategies.

Understanding Kubernetes secrets in a Kubernetes environment

As we know, in today’s era, most applications are deployed using Kubernetes. So that applications can function properly, and the users can use the applications without any issues. The applications sometimes require access to external resources, services or databases for processing or storing data. One of the most efficient ways of accessing sensitive data from other services is the secret object of the Kubernetes environment.

Understand all the Cyber Essentials requirements for IT infrastructure (April 2025 changes included)

Cyber Essentials is a government-backed scheme that helps businesses of all sizes protect themselves from common cyber threats. The scheme sets out five technical controls companies must implement to achieve certification. These controls protect against the most common cyber attacks, such as malware, phishing, and denial-of-service attacks.

Vehicle Number Check and RC Check Online: How to guide

You might be aware of the utility of an RC if you are a vehicle owner. When you register a new vehicle with the Regional Transport Office (RTO), the RTO issues you a Registration Certificate (RC) which contains comprehensive information about yourself, your vehicle, and other vital details, such as the termination of the validity of the certificate. Some of the details mentioned in an RC certificate & verified during an Vehicle Number Check.

2023 Black Friday / Cyber Monday Top Cybersecurity Tips

November brings two of the busiest shopping days of the year, plus some potential security risks, even if you never leave the comfort of your home. The annual Black Friday and Cyber Monday (BF/CM) events that originated in the United States have increasingly become a global phenomenon. With huge sales and “doorbuster” deals to kick off the holiday shopping season, they see a massive number of transactions.

Phishing Attacks Expected to More Than Double During the Black Friday and Cyber Monday Shopping Week

Another day, another warning about holiday scams! Lookout Inc., a data-centric cloud security company, is warning employees and businesses that phishing attacks are expected to more than double this week, based on historical data. With more corporate data residing in the cloud and a massive amount of employees still working remotely, mobile has become the endpoint of choice for the modern workforce.

Digital Skimming Increases by 50%, Just in Time for the Holiday Season

Security researchers identify growth in the use of an ongoing cyberskimming campaign that involves compromising legitimate website checkout code. We’ve all seen a video that shows someone fidgeting with a credit card terminal only to pull off a very realistic molded cover that looks identical to the actual device beneath it complete with its own circuitry to read and store credit card swipes. Now take that very same idea and put it into the digital world.

New Data Covers How the Retail Market is at Greater Risk of Industry-Specific Cyberthreats

A new analysis of the retail market’s threat landscape discusses the challenges faced by this industry and what threat tactics are being used to take advantage of retail’s cyber weaknesses. Not every report needs to have stats on the state of how bad things are. In fact, it’s quite refreshing for a report to simply state what kinds of attacks are transpiring and what the reader can do to mitigate such threats.