Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Using pentest findings to inform insurance risk assessments

Cyber insurance is now a routine part of organisational risk management, particularly for organisations with complex IT estates and growing digital exposure. As cyber incidents continue to drive operational disruption and financial loss, insurers are placing greater emphasis on understanding the true level of cyber risk they are underwriting through insurance risk assessments. For senior IT leaders, this often creates friction.

2025 Q4 DDoS threat report: A record-setting 31.4 Tbps attack caps a year of massive DDoS assaults

Welcome to the 24th edition of Cloudflare’s Quarterly DDoS Threat Report. In this report, Cloudforce One offers a comprehensive analysis of the evolving threat landscape of Distributed Denial of Service (DDoS) attacks based on data from the Cloudflare network. In this edition, we focus on the fourth quarter of 2025, as well as share overall 2025 data.

How to Migrate from a Traditional Firewall to a Next-Generation Firewall

The evolution of cyber threats is rendering many traditional firewalls obsolete as they are no longer capable of delivering the visibility and protection required in today’s environments. According to WatchGuard's Internet Security Report, network detected malware increased by 15% in the second quarter of 2025, a clear sign that legacy perimeter security solutions are no longer sufficient. Despite this reality, many companies continue to rely on outdated firewalls and hardware.

Viberails: Guardrails for AI Operations.

Sr. Technical Content Strategist The recent attention on OpenClaw brought something we've known for a while at LimaCharlie into sharp focus: Unrestricted AI operations are extremely powerful and incredibly risky. The security challenges presented by AI adoption can rival the productivity gains it delivers. Unrestricted AI agents can read credentials, execute commands, send emails, and make API calls without meaningful oversight.

Web Application Penetration Testing - Complete Guide (2026)

Web application penetration testing has a reputation for being more complicated than it needs to be, as new testers are often dropped into a sea of tools and terminology with little guidance on how an objective test should flow. The same problem shows up higher up the org chart, with Founders, CTOs, and other technical leaders who regularly receive pentest reports packed with screenshots and acronyms but short on clarity: what actually matters, what can wait, or how serious the risk really is.

Lessons From 2025: Zero-Day Exploitation Shaping 2026

Zero-day exploits were among the defining cyber threats of 2025, with high-severity flaws affecting platforms such as React2Shell, Oracle E-Business Suite (EBS), and CitrixBleed 2 highlighting how quickly zero-days can be weaponized and how damaging they can be. To help organizations understand the zero-day threat landscape, Outpost24’s threat intelligence team has compiled a review of the vulnerabilities they encountered in the wild throughout 2025.

Inside the Surge of Cyber Attacks Targeting Manufacturing

Manufacturing is facing a sharp rise in cyber attacks, driven by increased connectivity, IT/OT convergence, and complex supply chains. This blog explores the key threats targeting the sector and explains why proactive, intelligence-led cybersecurity is essential to protect operations and reduce risk.

Managing Software Supply Chain Security for the AI Era

Artificial intelligence has fundamentally changed how we build software. Generative AI tools help developers write code faster, automate mundane tasks, and solve complex logic problems in seconds. But this speed comes with a hidden cost. When you accelerate development without adjusting your security posture, you inadvertently accelerate risk. Relying on AI-generated code and open-source packages in cloud environments can expose your organization to serious, often silent, vulnerabilities.