If You’re Not Experiencing Some Failure, You’re Not Taking Enough Risk
I just came across a really interesting concept, which I’ll call “Living by Umesh”, or, being “Umeshian”–in honor of the source. A blogger by the…
I just came across a really interesting concept, which I’ll call “Living by Umesh”, or, being “Umeshian”–in honor of the source. A blogger by the…
Hackers allegedly claim that a software company based in India was compromised on December 19, 2024, by a hacker identified as @303. The breach exposed…
In an era where instant messaging apps like WhatsApp, Telegram, Signal, iMessage, Viber, and WeChat dominate personal and professional communication, digital privacy and security have…
Cessnock City Council has created a chief information officer role to lead the council’s information technology strategy. In the job posting, the NSW Hunter Valley…
South African telecom provider Cell C disclosed a data breach following a cyberattack Pierluigi Paganini April 14, 2025 Cell C, one of the biggest telecom…
The code below does the following: Read a list of IPs Send each line (IP) to the ipinfodb web service Parse the XML result Display…
Tirreno is an open-source fraud prevention platform designed as a universal analytics tool to monitor online platforms, web applications, SaaS products, digital communities, mobile apps,…
Prospa, an online lender for small business, has used hackathons and graph database technology to map out complex relationships between directors and entities applying for…
This is an interesting post about how the concept of PageRank for URLs is becoming dated at best, and obsolete at worst. The idea is…
In recent years, we’ve witnessed a range of cyberattacks targeting critical infrastructure and both public and private sector entities. These cyber breaches have often disrupted…
As AI becomes embedded in daily business workflows, the risk of data exposure increases. Prompt leaks are not rare exceptions. They are a natural outcome…
Compromised passwords, unpatched vulnerabilities and unauthorised applications can all lead to an endpoint being exploited by threat actors. Peter Soulsby, the Head of Cybersecurity at…