Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

MAS Compliance 101: Key Regulations for Financial Institutions in Singapore

The Monetary Authority of Singapore (MAS) is both the central bank and chief financial regulator of Singapore. As such, they publish best practices (“Guidelines”) and legally binding regulations (“Notices”) regarding technology risk management and cyber hygiene.

Who broke the Internet? Arkana Security names U.S. broadband provider on new DLS

In 2024, Cyjax observed the emergence of 72 extortion and ransomware group data-leak sites (DLSs). As of late March 2025, Cyjax has identified DLSs for 19 new groups this year, as noted in recent blogs on extortion groups Morpheus, GD LockerSec, Babuk2, Linkc, and Anubis.

Top 10 Threat Intelligence Jobs in the UK

The global threat intelligence market size was valued at USD 5.80 billion in 2024. The market is projected to grow from USD 6.87 billion in 2025 to USD 24.05 billion by 2032, exhibiting a CAGR of 19.6% during the forecast period. This tremendous growth translates into an increase in both the supply and demand for skilled professionals in threat intelligence.

Top 7 AI Pentesting Tools

AI is reshaping industries, but security teams treat it like traditional software. Unfortunately, the real problem is AI models don’t just have bugs—they have systemic vulnerabilities. Adversarial manipulation, data poisoning, and model inversion aren’t edge cases; they’re real threats attackers are already exploiting. Yet, most security programs lack a structured approach to testing AI risks. Conventional pentesting isn’t enough.

API Security Risks and How to Mitigate Them

The industry treats API security like a checklist—patch a few issues, enforce some rules, and move on. But these risks aren’t isolated flaws; they’re symptoms of a deeper failure in how APIs are designed and secured. Built for speed and interoperability, APIs often expose more than intended, making security an afterthought.

How Technology Is Changing the Way We Travel

Technology has transformed modern travel to become unrecognizable from what it was ten years ago. Travel advancements today go beyond basic speed improvements because technology rewards travelers with simplified processes. It is also far more individualized in every sense, from the elaborate booking process to the various ways individuals get around a new city. The progress of every journey depends on technology, at least through the connected and AI systems of booking apps that assist travelers. In this blog post, we discuss changes in travel patterns caused by the internet and methods to generate income through these growths.

How to Protect Your Live Stream from Hackers and Unauthorized Access

Live streaming has become extremely popular. Whether it's for gaming, business meetings, or virtual fitness classes, it's an easy way to connect with people in real time. However, just like any other online activity, live streaming has its risks, especially when it comes to hackers or unauthorized access. Imagine you are hosting a big event, and suddenly, someone hijacks your stream. It will disrupt everything and lead to stealing sensitive information or damaging your reputation. Let's look through the simple ways to protect your live stream.