My Courses
-

Reasons Behind SIEM Rule Failures and Solutions: Lessons Learned from 160 Million Attack Simulations
Security Information and Event Management (SIEM) systems serve as essential tools for detecting suspicious activities within enterprise networks, enabling organisations to identify and respond to…
-

Is an SSH brute-force Go module stealing your credentials?
Cybersecurity researchers have identified a malicious Go module, dubbed “golang-random-ip-ssh-bruteforce,” which masquerades as a brute-force tool for SSH but is designed to covertly exfiltrate credentials…
-

Robust MLSecOps vital for managing vulnerabilities
Organisations that fail to adapt their security programs while implementing Artificial Intelligence (AI) risk exposure to a range of both traditional and emerging threats. MLSecOps…
-

Lightweight LLMs decrease incident response time using decision theoretic planning
Researchers from the University of Melbourne and Imperial College London have developed a novel method for enhancing incident response planning using Large Language Models (LLMs),…
-

Apple releases fix for CVE-2025-43300 zero-day vulnerability
Apple has released critical security updates to address a zero-day vulnerability impacting iOS, iPadOS, and macOS, which has reportedly been exploited in the wild. The…
-

AI boosts ransomware impacts
Ransomware continues to pose a significant threat to large and medium-sized businesses, with numerous ransomware gangs leveraging artificial intelligence for automation, according to Acronis. From…
-

Chinese hacker groups Murky, Genesis, and Glacial Panda targeting cloud computing and telecommunications
Cybersecurity researchers have raised alarms about the malicious activities of a China-nexus cyber espionage group known as Murky Panda, which exploits trusted relationships in the…
-

Automation is transforming how penetration testing services are provided.
Pentesting remains one of the most effective methods for identifying real-world security weaknesses before adversaries can exploit them. However, as the threat landscape has evolved,…



