Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

API Security in the Education Sector: Protecting the Digital Learning Ecosystem

Recent research shows that the education sector now faces over 4,300 cyberattacks per week per organization, a 41% year-on-year increase. Education also consistently ranks among the top three most targeted industries globally, driven by the volume of sensitive student data and heavy reliance on cloud-based learning systems.

Alert Fatigue, Shoplifting Risk and 2025 Security Economics

The Razorwire Christmas Party 2025 episode compares most cyber incidents to shoplifting rather than aviation disasters, with losses treated as part of the cost of doing business. Burnout in 2025 often grows from false positives, alert fatigue and badly shaped workflows, so security economics and ergonomics matter more than dramatic nation state stories.

5 IT Pros, 900 Users: Papernest Scales Global Operations with JumpCloud [Español]

How does a lean IT team of just 5 people support 900 users across offices in Barcelona, Paris, and Reims? In this video case study (presented in Spanish), Carles Anton Güell, IT Manager at Papernest, explains how they moved away from "tedious" Active Directory to a single unified solution. By integrating JumpCloud with their Google Workspace, Papernest centralized identity, hardware (MDM), and office Wi-Fi into one seamless workflow.

Third-Party Risk Management: Best Practices and Trends

In the quiet corners of the darknet, threat actors aren’t always looking for a way to break through your front door. Instead, they’re hunting for the “side door”—the niche cloud provider you use for analytics, the marketing firm with access to your customer data, or the logistics partner with a direct line into your ERP. As we move into 2026, Third-Party Risk Management(TPRM) has evolved from a periodic compliance exercise into a high-stakes game of digital chess.

LevelBlue SpiderLabs: Ransomware Attacks Up 17% in 2025

Ransomware attacks increased by 17.2% percent year-over-year in 2025, with the group Qlin dominating the threat landscape, according to data generated by the LevelBlue SpiderLabs team. These attacks focused primarily on the manufacturing and technology sectors, with the US by far being the most targeted nation. 2025 continued the trend of yearly increases; however, over the last few years, the rate of attacks has somewhat slowed.

Zero-day vulnerabilities: what they are and how to respond

Zero-day vulnerabilities often attract attention and concern because of their unpredictability. They are, by definition, weaknesses that are unknown to software vendors and therefore have no official fix at the point of discovery. When discovered and exploited by malicious actors, they allow attackers to bypass controls before organisations even realise there is a problem.

Stop secrets before they leave your laptop (Git hooks + ggshield install)

Let's look at Git hooks, which is where ggshield really starts paying off in day-to-day developer workflow. Git hooks are built-in automation in Git. When certain events happen, like committing or pushing, Git checks for specific files inside the.git/hooks folder. If a hook file exists, Git runs it automatically. For example, if there’s a file named pre-commit, Git will execute it every time you commit.

Authenticate Users in Joomla Using the REST API: A Practical Guide for Developers

Modern Joomla applications are no longer limited to traditional website workflows. Today, Joomla powers mobile apps, headless frontends, third-party integrations, and backend services that rely heavily on REST APIs. In all these cases, secure API authentication becomes a foundational requirement.

Employee Cybersecurity Awareness Training: Why It Matters?

As we approach 2026, cybersecurity threats continue to escalate in complexity and frequency. With organizations increasingly reliant on digital infrastructure, the human element remains the most vulnerable entry point for cyberattacks. Studies show that 95% of data breaches stem from human errors, which can be employees clicking on malicious links, using weak passwords, or mishandling sensitive data.