Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Zero Trust Strengthens Data Protection to Achieve National Cyber Strategy Goals

CrowdStrike recently announced FedRAMP authorization for CrowdStrike Falcon Data Protection, now available to government entities requiring Federal Risk and Authorization Management Program (FedRAMP) Moderate authorization, enabling them to secure assets through the CrowdStrike Falcon Platform in GovCloud. This advancement supports compliance efforts and adoption of Zero Trust frameworks across government environments.

FSOCIETY & FUNKSEC Collaborate On Future Attacks

On January 15th, the FSOCIETY ransomware group published on their official DLS (data leak site) that they have begun a partnership with the rising Funksec group. The FunkSec ransomware group first emerged publicly in late 2024 and rapidly gained prominence by publishing over 85 claimed victims—more than any other ransomware group in the month of December.

The Growing Risk of Insider Threats in Cyber Security

Cyber security threats are increasingly complex, and while external attacks like phishing and malware often take centre stage, insider threats are emerging as a significant concern. Insider threats are risks originating from within an organisation, which pose unique challenges. They exploit an insider’s knowledge of systems, processes, and vulnerabilities, making detection and prevention particularly challenging.

Cyber Threats in London: The Facts and Figures

Cybercrime affects over 5 million individuals in the UK every year, with a majority living in London. This densely populated area is unsurprisingly a hotspot for cybercriminal activity. It’s one of the world’s leading financial and technological hubs, with thousands of Londoners experiencing cybercrimes such as scams, hacked accounts, and intimate image abuse annually.

Code Intelligence Wins Prestigious German AI Award at de:hub Pitch Night 2025

At the 6th de:hub Pitch Night, an event celebrating innovation and digital transformation, Code Intelligence was honored with the prestigious German AI Award. This recognition, awarded by a distinguished jury of industry experts and investors, underscores Code Intelligence’s pivotal role in advancing software security through artificial intelligence.

A Step-by-Step Guide to the Remote Code Execution Vulnerability

What if the very core of your company—the digital ecosystem you painstakingly built—is under attack? If an invisible enemy gets illegal access and begins manipulating data or disrupting essential processes, your entire organization could be paralyzed in an instant. Remote Code Execution (RCE) vulnerabilities have this terrifying reality. RCEs are the holy grail for hackers, allowing them to run arbitrary commands on a target machine.

What is AWS EC2? Everything about EC2 Fundamentals in AWS

Elastic Compute Cloud (EC2) is an Amazon Web Services (AWS) hosting service that extends scalable and secure virtual computing systems known as instances. They allow users to have their applications hosted in a scalable environment whereby computing resources can be easily scaled up or down as necessary. EC2 provides several instance types that can handle a variety of uses, from general-purpose and compute instances to those designed for memory-intensive applications.