top of page


5+1 Vulnerabilities All Pentesters Know And Attackers Still Exploit
In cybersecurity, when we take on candidates to mentor the next generation of professionals, we teach them about well-known and documented classes of vulnerabilities, like remote code execution , memory disclosure , injection flaws , supply-chain compromise , misconfiguration , and so on. Unfortunately, last year saw these “textbook” weaknesses show up in a number of widely used online services and infrastructure, perhaps even more so than in years prior. Surely, there are
norbert994
Jan 194 min read


Cyber Awareness Month: Real-world Phishing Stories
ChatGPT said:
Three real-life phishing and malware stories show how small mistakes lead to big troubles. From fake delivery texts to malware invites and CEO scams—verify, pause, and think before you click or pay.

Norbert
Oct 20, 20253 min read


Cyber Awareness Month: Granny Training 101
Cyber Awareness Month: Granny Training 101 — Cybersecurity isn’t just for offices; it’s for everyone at home too. Scammers often target older generations, assuming they’re less tech-savvy. Let’s prove them wrong! Show granny real scam examples, not jargon. Help her master the basics—use a password manager, enable updates, and install antivirus. Turn learning into a fun game: send a fake email and celebrate when she spots it. Keep it simple—don’t click, don’t reply, and always

David
Oct 9, 20252 min read


Cyber Awareness Month: Staying Safe Online
Cybersecurity Awareness Month is an annual campaign held every October to raise awareness about the importance of cybersecurity. It encourages individuals and organizations to take proactive steps to protect themselves online by promoting best practices, sharing resources, and highlighting the role everyone plays in building a safer digital world.

David
Oct 3, 20252 min read


The Hidden Costs of Cybersecurity (Part Three): The Lifecycle Reminder
When decision-makers think about cybersecurity budgeting, the spotlight usually falls on big-ticket items, the core services and technology stack that form the backbone of protection.
Whilst this makes sense overall, it often leaves some of the less glamorous areas underfunded. This usually includes the small print of operations like all the follow-up activities, the inevitable battle with shadow IT, and the new vulnerabilities that surface once projects transition into b

David
Sep 25, 20253 min read


The Hidden Costs of Cybersecurity (Part Two): Is Your Cyber Budget Honest Enough?
Cyber budgets often miss hidden costs: data growth drives storage & SIEM fees, security debt piles up with quick fixes, and staff burnout fuels churn. Plan for 25–30% annual data growth, allocate 10% of spend to pay down debt, and budget for 15–20% attrition. Honest budgets build resilience, cut firefighting, and keep teams strong.

David
Sep 4, 20253 min read


Hidden but Predictable: Cyber Budget Overruns (and How to Fix Them in 2026)
Cybersecurity budgets almost always run over. Not because of poor planning, but because hidden costs get overlooked. These recurring expenses create friction between CFOs and CISOs—and often strain the business.

Norbert
Aug 25, 20252 min read


Good Cyber Hygiene: The Everyday Hero of Cybersecurity
Cyber hygiene starts with the basics: long, unique passwords, timely software updates, and the principle of least privilege. These core...

David
Jun 11, 20253 min read


When our Lives Hang on IoT: The Backdoor in Your Heartrate Monitor
A widely used patient monitor—the Contec CMS8000—has been confirmed to contain embedded backdoor functions that allow remote code...

Norbert
Apr 22, 20253 min read


ESP32 Bluetooth "Backdoor": Hype, Reality, and the Future of IoT Security
Last week yielded another headline that sounded like a cybersecurity nightmare: “Undocumented backdoor found in Bluetooth chip used by a...

David
Mar 19, 20253 min read


Blockchain for Business Leaders: An Unbreakable Security Solution?
Discover the security challenges of blockchain technology. While decentralized and transparent, blockchain isn't unbreakable—learn about its

Norbert
Mar 14, 20253 min read


AirTags Reimagined: A New Era of Covert Tracking?
Apple’s AirTag technology enables precise item tracking, but researchers have found ways to exploit it.

David
Mar 10, 20253 min read


Record DDoS Attacks: Rising Threats from IoT-Based Botnets
Record DDOS attacks: Rising Threats from IoT-Based Botnets

Norbert
Feb 27, 20253 min read


The Hidden Backdoor: A Three-Year Supply Chain Attack on Go Developers
In the world of modern software development, trust is the foundation on which applications are built. But when that trust is exploited,...

Norbert
Feb 12, 20253 min read
bottom of page
