Blogs.

Read our blogs for the latest cyber security updates.
free aitm browser extension

Microsoft 365 AitM Phishing Protection: Free Browser Extension

Adversary-in-the-Middle (AitM) phishing is a rapidly growing threat that can...

AI agents in cybersecurity

AI Agents in Cybersecurity: What’s Real, What’s Hype, and What's Next

Artificial intelligence is everywhere in cybersecurity conversations right now....

cyber threats report 2026

The Cyber Threat Landscape 2026: Building Resilience, Acting Fast

Cyber defence is entering a race measured in minutes, not days. As we move into...

free aitm browser extension

Microsoft 365 AitM Phishing Protection: Free Browser Extension

Adversary-in-the-Middle (AitM) phishing is a rapidly growing threat that can...

AI in cybersecurity, insights from the SOC

Insights from the SOC: Why Analysts Still Matter in the Age of AI

Every week, vendors announce new AI tools promising autonomous defence and...

Remote code execution via Microsoft’s Windows Update Health Tools

For readers who want the full technical analysis, the detailed research blog is...

prompt injection for the good

Battling Shadow AI: A Practical Tool for CISOs

Generative AI is transforming how businesses operate. Tools such as ChatGPT,...

top cyber threats in logistics

Top Cyber Threats in Logistics and How to Defend Against Them

For decades, transport and logistics operators have focused primarily on...

Get in touch.

Speak to one of our experts and see how we can help
Let's talk
Illustration
business email compromise case

When Business Email Compromise Nearly Costs a Million: An Incident Response Story

Business Email Compromise (BEC) remains one of the most damaging yet...

fake captcha attacks - clickfix

ClickFix Block: Protect Your Organisation from Fake CAPTCHA Attacks

Curious about the technical details? Read our technical blog on ClickFix Block....

KI und Cybersicherheit

Uses of AI in Enterprise Cybersecurity: Risks, Opportunities, Strategies

To fully unlock the potential of AI systems in cybersecurity, organisations...

1 2 3 4 5

Are you ready to get started?

See how affordable complete protection can be for you