Articles, News and Industry Tips

Read the latest articles on best practices, building customer-centric products, and the latest in cybersecurity.
Filters
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Vulnerability Management
CVE-2025-4760: Authenticated Stored XSS Vulnerability in WSO2 API Manager, What You Need to Know?

October 16, 2025

Vulnerability Management
CVE-2025-41248: Spring Security Authorization Bypass in Method Security Annotations on Parameterized Types

October 15, 2025

Threat Integrations
Mapping TLS 1.3 Adoption Across Azure Services: What’s Ready, What’s Not

October 13, 2025

Ransomware
DragonForce Ransomware: Technical Analysis and Mitigation Strategies

September 23, 2025

Information Security
Cybersecurity in Aviation Industry

September 10, 2025

Threat Integrations
Secure, Scalable, and Codeless: Building Microsoft Sentinel Connectors for Logs and Threat Intelligence with CCF

September 5, 2025

Ransomware
Ghost Ransomware Playbook: How it Works, What it uses and How to prevent it

August 11, 2025

Network Security
IPFIX Data Export: From Research to Successful Log Collection

August 8, 2025

Information Security
Why Healthcare sector remains as the top target for cyberattacks

July 7, 2025

Ransomware
The BlackLock Breakdown: Tools, Tactics and The Rivalry that brought it down

June 16, 2025

Threat Intelligence
Initial Access Brokers: The Hidden Architects of Modern Cyberattacks

June 9, 2025

Information Security
Securing the Decentralized Enterprise with Zero Trust Principles

May 21, 2025

Subscribe to our Newsletter