Skip to content

//CYBER SECURITY, DIGITAL HEALTH, MEDICAL DEVICE AND DEFENCE SECURITY BLOG

  • There are no suggestions because the search field is empty.

Subscribe for Updates

JOIN OUR MAILING LIST FOR THE LATEST POSTS, INSIGHTS, AND CYBERSECURITY GUIDANCE.

ARCHIVE

Cursor IDE Security: How to...

The AI-powered IDE revolution is here — and with it, an entirely new class of security risk that most developers ...

Critical OpenClaw Flaw...

The rapid rise of AI development tools is transforming enterprise innovation, enabling autonomous AI agents to augment ...

Weekly Round-Up Issue 13

This week’s cyber briefing: a major attack on a global medical equipment supplier, a new investigation revealing ...

Evaluating AI Jailbreaks with...

In this blog post, we explore how the StrongREJECT benchmark helps security engineers systematically evaluate and ...

Passing the Security Vibe...

In the rapidly evolving landscape of AI, the promise of AI-generated applications is both exciting and daunting. While ...

Inside the Wild World of...

Imagine an AI agent tasked with autonomously researching your company's competitors, crawling the web, synthesising ...

Stryker Cyberattack 2026:...

On 11 March 2026, employees at Stryker, one of the world's largest medical technology companies, arrived at work to ...

Weekly Round-Up Issue 12

This week's round-up: A maximum-severity vulnerability in widely deployed network infrastructure. The director of ...