South African telecom provider Cell C disclosed a data breach
14
Apr
2025

South African telecom provider Cell C disclosed a data breach

South African telecom provider Cell C disclosed a data breach following a cyberattack Pierluigi Paganini April 14, 2025 Cell C,…

Ruby: Parsing an IP List to Send to IpInfoDB
14
Apr
2025

Ruby: Parsing an IP List to Send to IpInfoDB

The code below does the following: Read a list of IPs Send each line (IP) to the ipinfodb web service…

Tirreno: Open-source fraud prevention platform
14
Apr
2025

Tirreno: Open-source fraud prevention platform

Tirreno is an open-source fraud prevention platform designed as a universal analytics tool to monitor online platforms, web applications, SaaS…

Prospa de-risks loan book by mapping borrower relationships
14
Apr
2025

Prospa de-risks loan book by mapping borrower relationships

Prospa, an online lender for small business, has used hackathons and graph database technology to map out complex relationships between…

PageRank for People Rather Than URLs
14
Apr
2025

PageRank for People Rather Than URLs

This is an interesting post about how the concept of PageRank for URLs is becoming dated at best, and obsolete…

Naveen Goud
14
Apr
2025

Cyber Attack Targets Military Aid Relief Aircraft in Historic GPS Spoofing Incident

In recent years, we’ve witnessed a range of cyberattacks targeting critical infrastructure and both public and private sector entities. These…

The quiet data breach hiding in AI workflows
14
Apr
2025

The quiet data breach hiding in AI workflows

As AI becomes embedded in daily business workflows, the risk of data exposure increases. Prompt leaks are not rare exceptions….

14
Apr
2025

Focus is the key for successful endpoint protection

Compromised passwords, unpatched vulnerabilities and unauthorised applications can all lead to an endpoint being exploited by threat actors. Peter Soulsby,…

Why Your Website Needs a “Discovered Content” Section
14
Apr
2025

Why Your Website Needs a “Discovered Content” Section

One of the advantages of social content sharing is that if I like what you write then there’s a good…

Naveen Goud
14
Apr
2025

The Hidden Cybersecurity threats in Old Hard Drives and Smartphones

In today’s digital age, personal and professional data are constantly being stored, transferred, and backed up across various devices. Among…

Sector by sector: How data breaches are wrecking bottom lines
14
Apr
2025

Sector by sector: How data breaches are wrecking bottom lines

Data breaches are rising across industries, hitting healthcare, finance, and retail especially hard. The damage goes beyond lost data, as…

A Word on my Distaste for Conditional Friendship
14
Apr
2025

A Word on my Distaste for Conditional Friendship

One thing that bothers me severely is the concept of a conditional friendship. There are a few ways these come…