Blogs.

Read our blogs for the latest cyber security updates.
cyber threats report 2026

The Cyber Threat Landscape 2026: Building Resilience, Acting Fast

Cyber defence is entering a race measured in minutes, not days. As we move into...

free aitm browser extension

Microsoft 365 AitM Phishing Protection: Free Browser Extension

Adversary-in-the-Middle (AitM) phishing is a rapidly growing threat that can...

AI in cybersecurity, insights from the SOC

Insights from the SOC: Why Analysts Still Matter in the Age of AI

Every week, vendors announce new AI tools promising autonomous defence and...

Remote code execution via Microsoft’s Windows Update Health Tools

For readers who want the full technical analysis, the detailed research blog is...

prompt injection for the good

Battling Shadow AI: A Practical Tool for CISOs

Generative AI is transforming how businesses operate. Tools such as ChatGPT,...

top cyber threats in logistics

Top Cyber Threats in Logistics and How to Defend Against Them

For decades, transport and logistics operators have focused primarily on...

business email compromise case

When Business Email Compromise Nearly Costs a Million: An Incident Response Story

Business Email Compromise (BEC) remains one of the most damaging yet...

Get in touch.

Speak to one of our experts and see how we can help
Let's talk
Illustration
fake captcha attacks - clickfix

ClickFix Block: Protect Your Organisation from Fake CAPTCHA Attacks

Curious about the technical details? Read our technical blog on ClickFix Block....

KI und Cybersicherheit

Uses of AI in Enterprise Cybersecurity: Risks, Opportunities, Strategies

To fully unlock the potential of AI systems in cybersecurity, organisations...

Dual-Use-KI in die Cybersicherheit

Dual-use AI in Cyberattacks: How LLMs Are Reshaping the Threat Landscape

The malicious use of AI is evolving, making attacker tactics increasingly...

Are you ready to get started?

See how affordable complete protection can be for you