February 9 2026
The Rise Of Shadow AI: Preventing Data Exfiltration In The Age Of ChatGPT
Shadow AI is set to be one of the biggest data security threats of 2026. Find out why this is a challenge and what enterprises need to do about it.
February 4 2026
Prompt Poaching: How Fake ChatGPT Extensions Stole 900k Users’ Data
Two fake AI extensions hit 900k Chrome users, stealing chats, code and data – a stark example of Prompt Poaching.
January 29 2026
Lotus C2 – A New C2 Framework Sold as a Cybercrime Kit
Learn how Lotus C2 enables credential theft, data exfiltration, and mass attacks, blurring red team and cybercrime lines.
January 26 2026
The Void: A New MaaS Infostealer Targeting 20+ Browsers
Find out how Model Context Protocol (MCP) could be abused as a covert channel for data theft: five real risks, examples, and mitigations.
January 22 2026
Data Breach Prevention: Practical Ways To Stop Data Loss
Data breaches are costly cyberthreats. Learn how data breach prevention strategies reduce risk and stop the most common causes in our guide.
January 22 2026
How A Clear Data Loss Prevention Policy Reduces Risk
Find out what's needed to create a strong data loss prevention policy and why this matters in a complex environment.
January 22 2026
Getting A Data Loss Prevention Strategy Right
A strong data loss prevention strategy can be the difference between stopping a potential breach early or a costly mistake. Here's what firms need to know when creating one.
January 21 2026
How MCP Could Become a Covert Channel for Data Theft
Find out how Model Context Protocol (MCP) could be abused as a covert channel for data theft: five real risks, examples, and mitigations.
January 21 2026
DNS Exfiltration: How Hackers Use Your Network to Steal Data Without Detection
Learn how DNS exfiltration works and why this method of data theft often goes undetected.
January 14 2026
Managing Ransomware Remediation To Reduce Long-Term Damage
What key steps must organizations follow to ensure effective ransomware remediation in the event of a data breach?
January 14 2026
Developing A Ransomware Backup Strategy Your Business Can Trust
A clear ransomware backup strategy is a critical part of any firm's defenses. Here's what you need to know.
January 14 2026
Ransomware Protection: A Complete Guide To Preventing Modern Attacks
What must all firms know in order to improve their ransomware protection strategy for the threats of 2026?












