Developer Tool Supply Chain Risk: A Practical Guide
Why CI tools, scanners, and build dependencies keep turning up as attack vectors, and what actually works to reduce the blast radius when a trusted tool gets compromised.
Read Full ArticleExpert insights, threat analysis, and cybersecurity best practices from our security research team
Why CI tools, scanners, and build dependencies keep turning up as attack vectors, and what actually works to reduce the blast radius when a trusted tool gets compromised.
Read Full ArticleVerizon's 2025 DBIR shows SMBs had roughly four times more confirmed breaches than large organisations, and 88% of those involved ransomware. A look at why the shift happened and what reasonable defence looks like without a SOC.
Read More →Anthropic's Mythos model finds vulnerabilities at scale. The coverage was huge. But finding bugs and exploiting them are different problems, and these tools are available to everyone now.
Read More →Cisco patched a CVSS 9.8 unauthenticated RCE in Smart Software Manager On-Prem caused by an internal service that was reachable from the network it should never have seen.
Read More →A six-month social engineering operation by DPRK-linked hackers culminated in the largest DeFi hack of 2026. The attack combined fake tokens, manipulated oracles, and pre-signed transactions.
Read More →TeamPCP compromised the Trivy vulnerability scanner and used it to breach the European Commission's AWS environment. 340GB of data stolen, 29 EU entities affected.
Read More →Google patches an actively exploited use-after-free in Dawn, its WebGPU implementation. CISA added it to KEV the same day. All Chromium browsers affected.
Read More →Anthropic accidentally shipped source maps in their Claude Code npm package, exposing 512,000 lines of source code. A breakdown of what happened and how to prevent it.
Read More →Critical F5 BIG-IP APM vulnerability reclassified from DoS to RCE. Linked to UNC5221, the Brickstorm backdoor, and a year-long breach of F5's own network. Patch now.
Read More →A comprehensive guide comparing three application security testing approaches and how they work together to protect your organisation.
Read More →ShinyHunters exploited misconfigured Salesforce Experience Cloud guest user permissions to steal data from hundreds of companies. Here's how it happened and what your team should do about it.
Read More →Analysis of the latest ransomware tactics and strategic defense recommendations for enterprise security teams navigating an increasingly hostile threat landscape.
Read More →How automated vulnerability scanning transforms security operations, reduces risk exposure, and delivers measurable ROI. Updated with the latest 2026 data.
Read More →