Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyber Budget Wars: Why CFOs Are Now Steering Security Strategy

Over the past five years, the enterprise technology landscape has undergone a significant shift. Global disruptions, hybrid work models, and an increasingly complex threat environment have driven organizations to invest heavily in digital infrastructure. Some analysts have even dubbed this era "the biggest surge in technology investment in history."

The Cat's Out of the Bag: A 'Meow Attack' Data Corruption Campaign Simulation via MAD-CAT

In 2024, I published Feline Hackers Among Us? (A Deep Dive and Simulation of the Meow Attack), which explored the notorious Meow attack campaign that had plagued unsecured databases since 2020. That article focused on demonstrating the attack against a single MongoDB instance using a simple Python script. A proof-of-concept that illustrates how devastating misconfigurations can be.

Zero downtime database migrations: Lessons from moving a live production database

If you've ever been involved in a major database migration, you know just how complex and honestly, nerve-wracking they can be. At Tines, we recently faced the challenge of migrating a customer's dedicated tenant by moving all the customer’s critical workloads running on Tines between two different AWS Regions. All while maintaining 100% system availability.

The Role of AI Security Agents in Modern Exposure Management

AI security agents are reshaping how organizations manage exposure. This blog explores where they deliver the most impact — from smarter prioritization to faster ownership mapping and assisted remediation — and how this shift moves security teams from automation to autonomy.

Difference Between TPM and HSM Security

A Trusted Platform Module (TPM) is a microcontroller designed to increase the levels of protection for computers, smartphones, and other devices through built-in security support that offers the necessary cryptographic operations. TPMs are unlike other software-based security; they provide a hardware-bound security, thus, it becomes nearly impossible for the attacker to tamper with the protected keys and information stored within the TPM.

A multi-cloud BCP approach for CPS 230 compliance using CloudCasa

When Amazon Web Services’ US-East-1 region went down recently, a long list of global apps and services went with it. For most companies, that meant a few hours of frustration. For APRA-regulated financial institutions in Australia, an outage like that is something much more serious — a compliance and operational-resilience test under CPS 230, which is now in force as of July 2025.

Phishing Emails Use Invisible Hyphens to Avoid Detection

A phishing campaign is using invisible characters to evade security filters, according to Jan Kopriva at the SANS Internet Storm Center. The emails use soft hyphens to break up the subject line “Your Password is About to Expire” so the messages aren’t flagged as malicious. The email client doesn’t render the hyphens, however, so the user sees a normal sentence.

How the Falcon Platform Delivers Fast, CISO-Ready Executive Reports

Most exposure reporting is still slow, error-prone, and disconnected from reality. Analysts spend hours collecting and formatting data using different tools that produce conflicting priorities. Reports are bloated with raw CVE lists that lack context and rarely connect to business impact. They are often delayed, arriving after the adversaries have moved. While teams struggle with outdated reports, adversaries are seeking new ways to gain initial access.