FEATURED POST

Log4J: How a security vulnerability (almost) brought the internet to it's knees.

Log4Shell was the ‘single biggest most critical vulnerability of the past decade’, which prompted a global panic among server administrators. But what is the Log4Shell vulnerability, and what can it teach us?

All posts

What happens to stolen data?

Data has become one of the most lucrative commodities on earth, and it’s no wonder that it’s a prime target for cybercriminals. But what exactly do hackers do with stolen data? That’s what we’ll be exploring in this insights article.

Read More »