Tag:cybersecurity

Agentic development tools don't need to bypass your firewall. They're already inside. And if an attacker can control what they read, they can control what they do. We tested Google's Antigravity IDE against indirect prompt injection attacks.

Silhouette of person in dark environment representing insider threat in agentic IDE security with code and terminal windows in background

When Your IDE Becomes An Insider: Testing Agentic Dev Tools Against Indirect Prompt Injection

Agentic development tools don't need to bypass your firewall. They're already inside. And if an attacker can control what they…

Dark underground stairway representing hidden SaaS security vulnerabilities and cloud dependencies

Cloud security vulnerabilities: the unpatchable risks hiding in your SaaS stack 

The cloud gives businesses scalability, agility, and built-in resilience. But it’s created a dangerous illusion: that moving workloads to SaaS…

Dark office environment showing interconnected multi-agent AI systems network visualization

Inject one agent, own them all: The cascading risk of multi-agent AI

Ninety percent of organizations are deploying AI agents. Most aren't monitoring what they do. Multi-agent systems amplify this blindspot: one…

Silhouettes of a team standing together in low light, representing collaboration within a Security Operations Center.

SOC Testing: Turning Your Security Operations Centre into a Continuous Learning Engine

SOC testing isn’t just about finding vulnerabilities. It’s about building collaboration, sharpening human judgment, and turning your SOC into a…

OT worker in the dark

Threat Actors Don’t Wait For Your Annual OT Pen test

Annual OT pen tests provide snapshots. Real attackers operate continuously. This is why your operational technology security strategy needs to…

aerial view of a city symbolising complexity and continuous threat readiness

Part 3: CBEST Series – The Future of Threat-Led Penetration Testing

Regulated testing like CBEST is pivotal, but as threats shift, organizations must adopt more strategic, agile threat-led penetration testing. Discover…

Passengers waiting in an airport terminal during global check-in disruption caused by ransomware attack

Airport Chaos Shows How Fragile Our Infrastructure Really Is

Recent airport chaos revealed how fragile global infrastructure really is. A basic ransomware attack disrupted shared systems, grounding flights worldwide.…

Executives in a boardroom looking out of tall windows toward the horizon, symbolising strategic vision and offensive security leadership.

Offensive Security Is No Longer Optional

Gartner’s 2025 research validates what we’ve long believed: to stay ahead of attackers, organizations must embrace continuous, proactive offensive security.

Abstract image of a shadowy crowd, symbolizing how red team OSINT reveals hidden human vulnerabilities

Inside a Red Team OSINT Operation: Mapping the Human Attack Surface 

Most organizations focus on infrastructure. Red teams target people. We explore how OSINT is used to map the human attack…