//CYBER SECURITY, DIGITAL HEALTH, MEDICAL DEVICE AND DEFENCE SECURITY BLOG
Subscribe for Updates
JOIN OUR MAILING LIST FOR THE LATEST POSTS, INSIGHTS, AND CYBERSECURITY GUIDANCE.
ARCHIVE
Harrison Mussell
FortiGate Exploits Put...
In recent months, cybersecurity teams worldwide have observed a significant rise in targeted attacks exploiting ...
AI-Driven Cyberattacks Target...
In a pivotal development within cybersecurity, recent AI-powered cyberattacks targeting multiple Mexican government ...
GitHub Copilot vs. Enterprise...
GitHub Copilot has transformed how enterprise development teams write code. It suggests completions, generates ...
Cursor IDE Security: How to...
The AI-powered IDE revolution is here — and with it, an entirely new class of security risk that most developers ...
Evaluating AI Jailbreaks with...
In this blog post, we explore how the StrongREJECT benchmark helps security engineers systematically evaluate and ...
Passing the Security Vibe...
In the rapidly evolving landscape of AI, the promise of AI-generated applications is both exciting and daunting. While ...
Inside the Wild World of...
Imagine an AI agent tasked with autonomously researching your company's competitors, crawling the web, synthesising ...
DCC Guide: Generating A Hash...
The Defence Cyber Scheme (DCC) requires applicants to provide a hash alongside the evidence that is provided for the ...
5