LATEST
Recent posts
RANSOMWARE2026-04-28
Inside a four-hour ransomware containment
How our IR team scoped, isolated and recovered a mid-market manufacturer hit by a fast-moving extortion crew.
FRAUD2026-04-15
Synthetic identities at scale: anatomy of a 2026 wave
An analysis of synthetic-identity fraud rings observed targeting European neobanks during Q1.
AI2026-03-30
Prompt injection beyond the chatbot
Why retrieval pipelines and agent tools are the next frontier for LLM application security.
DETECTION2026-03-12
Detection engineering with adversary emulation
A pragmatic loop for building, validating and maintaining detections that survive real attacks.