Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2026-1357: WordPress Plugin RCE Exposes Sites to Full Takeover

A critical vulnerability in the WPvivid Backup & Migration WordPress plugin allows unauthenticated attackers to upload and execute arbitrary PHP files on exposed websites. Tracked as CVE-2026-1357, the vulnerability affects vulnerable versions of the plugin and enables remote code execution through network-accessible functionality intended for backup and migration workflows. With over 900,000 active installations, WPvivid is widely deployed across production WordPress environments.

Ransomware in Financial Services: Traditional Backup Isn't Enough

Many financial services IT leaders believe they’re protected against ransomware because they have backups. According to Sophos’ State of Ransomware in Financial Services 2025, 64% of financial services organizations were hit by ransomware in the past year. Of those with backups, a significant percentage discovered their backup infrastructure had been compromised too. Modern ransomware operators don’t just encrypt production data.

Open Source Supply Chain Security: Best Practices

Open-source components are the building blocks of modern software, enabling your team to innovate and deliver features faster. This reliance, however, introduces a significant challenge: your application’s security is now tied to a vast and complex supply chain of code you didn’t write. The risks are escalating, with attackers targeting open-source libraries to launch widespread breaches.

Welcome to the Blur: Designing Security That Works With, Not Against, AI Adoption

There's a moment in every security professional's career when they realise the game has fundamentally changed. Mine came last Tuesday at 3:47 PM, watching my colleague Erich argue with an AI agent about expense policy while simultaneously being phished by what I'm 87% certain was another AI agent pretending to be from IT. We’ve spent decades building security models around a simple premise: humans work here, threats exist out there, and our job is to build bigger walls between the two.

Warning: Attackers Are Using DKIM Replay Attacks to Bypass Security Filters

Cybercriminals are abusing legitimate invoices and dispute notifications from popular services to send scam emails that bypass security filters, according to researchers at Kaseya’s INKY. The attackers have used this technique to impersonate PayPal, Apple, DocuSign, HelloSign, and others. “These platforms often allow users to enter a ‘seller name’ or add a custom note when creating an invoice or notification,” the researchers write.

Large Language Model (LLM) integration risks for SaaS and enterprise

The rapid adoption of Large Language Models (LLMs) is transforming how SaaS platforms and enterprise applications operate. From embedded copilots and automated support agents to internal knowledge-base search and workflow automation, organisations are increasingly integrating LLM APIs into existing services to deliver faster and more intuitive user experiences.

HIPAA Compliance for Dental Offices

When we talk about HIPAA compliance for dental offices, we’re not talking about theory or paperwork. We’re talking about patient privacy, regulatory exposure, and whether a practice can keep operating when something goes wrong. HIPAA is no longer a “back-office” concern—it’s a core part of running a modern dental practice.

CYJAX vs. SOC Radar: Different Approaches to Cyber Threat Intelligence

A detailed comparison of CYJAX and SOC Radar, exploring differences in automation, analyst-led investigations, RFIs, and intelligence depth to help security teams choose the right CTI platform. When organisations evaluate cyber threat intelligence platforms, the differences often go far beyond feature lists. They come down to philosophy, depth, and how intelligence is actually used in high-pressure environments.