Pixels, Polygons, and Payloads:
This research explores an unconventional malware delivery vector, demonstrating how trusted creative software tools can be repurposed to deliver paylo...
This research explores an unconventional malware delivery vector, demonstrating how trusted creative software tools can be repurposed to deliver paylo...
In April 2025, large retailers were targeted by cyber attacks that caused disruption across their services. Although attribution is still being confir...
Computer-Using Agents (CUAs), while intended to increase productivity, can be repurposed by threat actors for malicious use. In this post we will expl...
Within weeks of stepping into a new role, I found myself receiving multiple phishing emails impersonating our CEO. Rather than ignoring them, I though...
To help organisations understand and contextualise how human behaviours create risks and enable threats we have released our Human Threat Map to the p...
As attackers refine their techniques and the line between real and fake continues to blur, this Google Ads malware attack served as an effective case...
With AI technologies evolving at an unprecedented pace, are we truly prepared to handle the security challenges they pose to individuals and businesse...
Learn how a global fintech company stopped over 20 sensitive data leaks to GenAI tools daily—without blocking innovation. This case study explores how...
Discover how a leading international law firm secured generative AI (GenAI) usage without sacrificing productivity. Facing growing concerns over shado...
See how a high-growth digital bank protected sensitive data while enabling safe GenAI adoption across the enterprise. Faced with growing employee use...