Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Thriving Through Change: How Architects Are Turning Slowdowns Into Strength

After several months of declining billings, the AIA’s latest ABI reveals what many architecture firms experience every day: projects are slowing, decisions are taking longer, and securing new work is becoming more challenging. A softer market forces tough choices, but it also creates rare breathing room to fix long-standing operational pain points, especially those tied to scattered data, manual workflows, and inconsistent project startup processes.

The Razorwire Christmas Special 2025: Looking Back, Looking Forward

What happens when you gather some of the sharpest minds in cybersecurity for an end-of-year chat about where we've been and where we're heading? Welcome to Razorwire's Christmas special. Today I’m chatting with some of our favourite guests from 2025: clinical traumatologist Eve Parmiter, cyber futurist Oliver Rochford, CISO and podcast host Marius Poskus and occupational psychologist Bec McKeown for a roundup of the cybersecurity industry this year. This isn't a glossy year-in-review full of predictions and corporate optimism. We're talking about what's actually happened.

What You Need to Know about the University of Phoenix Data Breach

The University of Phoenix was founded in 1976 and is headquartered in Phoenix, Arizona, as a private, for-profit university designed for working adults and non-traditional students balancing family, career, and education. Accredited by the Higher Learning Commission, the institution later became one of the first online universities, offering personal support, career guidance, and flexible learning opportunities through over 100 programs.

CVE-2025-68613: Critical n8n RCE Vulnerability Enables Full Server Compromise

A critical remote code execution (RCE) vulnerability has been disclosed in n8n, a popular open-source workflow automation platform widely used to orchestrate business processes, SaaS integrations, and internal automation pipelines. Tracked as CVE-2025-68613, the vulnerability carries a CVSS score of 9.9 (Critical) and allows authenticated attackers to execute arbitrary system-level code on vulnerable n8n instances.

Top 7 Secret Scanning Tools for 2026

Secrets run your applications: API keys, SSH keys, tokens, passwords, database credentials. They reside in repositories, CI/CD pipelines, infrastructure-as-code templates, containers, and even chat logs; one stray commit is enough to expose a path into production. In 2024, abuse of valid account credentials was the initial access vector in roughly 30% of incidents investigated.

Understand the ggshield help menu ( options and global flags)

Let’s start by learning how to navigate ggshield like any other CLI tool: through its built-in help menu. To see the top-level help, just run ggshield with no options and press enter: ggshield Any time you want help for a specific command, add -h or --help to the end of that command before hitting enter. ggshield follows a standard command-line pattern you’ll see in many tools: ggshield ... If you’re new to CLIs, here’s what that means: ggshield is the program you’re running. are the extra details the command needs, like a path or filename.

Modernizing Cybersecurity Risk Assessment: A CISO 3.0 Guide for 2026

Forget the old-school spreadsheets. In the Agentic Era, a cybersecurity risk assessment is no longer a “once-a-year” event you do for the auditors. It is now a living, breathing strategy of Continuous Exposure Management (CEM). Think of it as a high-tech health check for your company’s digital life. It identifies where you’re bleeding data, who’s trying to cut you, and how to build a digital immune system that fights back.

Raising the Bar for Mobile Security: Reflections on 2025 and What 2026 Demands of Us

As 2025 comes to a close, it’s worth pausing, not to slow down, but to reflect on how rapidly the mobile security landscape is evolving and what that evolution now demands from all of us. This year reinforced something we have long believed at Appknox: security can no longer be an isolated activity or a late-stage control. As mobile applications become more interconnected, AI-enabled, and globally distributed, security must operate continuously and at scale, without slowing teams down.