News
1 week ago
A Breach in Uzbekistan’s Digital Infrastructure Exposes the Risks of Rapid E-Gov...
In January 2026, cyberattacks targeting three Uzbek government systems led to the exposure of roughly 60,000 data records — far fe...
Jan 21, 2026
Ransomware Doesn't Need to Lock Your Files Anymore — Here's Why That's Terrifyin...
Ransomware is evolving from "lock your files and demand payment" to "steal everything and threaten to leak it." About 50% of attac...
Jan 07, 2026
I Saw a Phishing Site That Traps Security Bots
A phishing kit had a hidden form field with no visible counterpart. It wasn't part of the UI. The victim would never see it. So wh...
Dec 02, 2025
AI Cybersecurity: The Sword and Shield of the Next Cyber Frontier
The age of human hacking is over. Microsoft's 2025 report confirms LLMs are automating attacks faster than defenders can react. We...
Aug 11, 2025
No-Code EPSS-Powered Vulnerability Management in Budibase
In this article, I will demonstrate how I implemented EPSS support and integrated this metric into my filtering and analysis proce...
