Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Zero-day vulnerabilities: what they are and how to respond

Zero-day vulnerabilities often attract attention and concern because of their unpredictability. They are, by definition, weaknesses that are unknown to software vendors and therefore have no official fix at the point of discovery. When discovered and exploited by malicious actors, they allow attackers to bypass controls before organisations even realise there is a problem.

Stop secrets before they leave your laptop (Git hooks + ggshield install)

Let's look at Git hooks, which is where ggshield really starts paying off in day-to-day developer workflow. Git hooks are built-in automation in Git. When certain events happen, like committing or pushing, Git checks for specific files inside the.git/hooks folder. If a hook file exists, Git runs it automatically. For example, if there’s a file named pre-commit, Git will execute it every time you commit.

Authenticate Users in Joomla Using the REST API: A Practical Guide for Developers

Modern Joomla applications are no longer limited to traditional website workflows. Today, Joomla powers mobile apps, headless frontends, third-party integrations, and backend services that rely heavily on REST APIs. In all these cases, secure API authentication becomes a foundational requirement.

Employee Cybersecurity Awareness Training: Why It Matters?

As we approach 2026, cybersecurity threats continue to escalate in complexity and frequency. With organizations increasingly reliant on digital infrastructure, the human element remains the most vulnerable entry point for cyberattacks. Studies show that 95% of data breaches stem from human errors, which can be employees clicking on malicious links, using weak passwords, or mishandling sensitive data.

SecurityScorecard CISO Steve Cobb as Cyber Santa | Cyber Santa's 2026 Predictions

The New Year is upon us and with a new year comes new changes. Cyber Santa is back with his predictions for the coming year and how cyber will evolve in the next 365 days. SecurityScorecard CISO Steve Cobb returns in his jolly red hat and white beard to shake his snow globe and see what's ahead for the cybersecurity industry in 2026 and what you need to know going into the new year. CISO responsibility, data sprawl, and AI governance are the top 3 on the list of emerging priorities.

The CISO's Take: Navigating Cyber Risk in Financial Services

“If you are solving problems at human speed, you are at a huge disadvantage, because your attackers are operating at machine speed.” As cyber risk – in both the financial services sector and more broadly – accelerates at the pace of automation and AI, securing our future requires practitioners to be more strategic than the threat actors after our assets.

Fraud Team Postmortems and Account Takeover Prevention

Fraud analysts know the pattern too well. After an account takeover incident, the postmortem confirms what happened. A stolen credential was used. A bot executed a replay. A mule account attempted a transfer. Yet the origin of the compromise remains unclear. The postmortem becomes an autopsy on a loss that already occurred. The core issue is the Window of Exposure.