• February 9 2026

    The Rise Of Shadow AI: Preventing Data Exfiltration In The Age Of ChatGPT

    Shadow AI is set to be one of the biggest data security threats of 2026. Find out why this is a challenge and what enterprises need to do about it.

  • February 4 2026

    Prompt Poaching: How Fake ChatGPT Extensions Stole 900k Users’ Data

    Two fake AI extensions hit 900k Chrome users, stealing chats, code and data – a stark example of Prompt Poaching.

  • January 29 2026

    Lotus C2 – A New C2 Framework Sold as a Cybercrime Kit

    Learn how Lotus C2 enables credential theft, data exfiltration, and mass attacks, blurring red team and cybercrime lines.

  • January 26 2026

    The Void: A New MaaS Infostealer Targeting 20+ Browsers

    Find out how Model Context Protocol (MCP) could be abused as a covert channel for data theft: five real risks, examples, and mitigations.

  • January 22 2026

    Data Breach Prevention: Practical Ways To Stop Data Loss

    Data breaches are costly cyberthreats. Learn how data breach prevention strategies reduce risk and stop the most common causes in our guide.

  • January 22 2026

    How A Clear Data Loss Prevention Policy Reduces Risk

    Find out what's needed to create a strong data loss prevention policy and why this matters in a complex environment.

  • January 22 2026

    Getting A Data Loss Prevention Strategy Right

    A strong data loss prevention strategy can be the difference between stopping a potential breach early or a costly mistake. Here's what firms need to know when creating one.

  • January 21 2026

    How MCP Could Become a Covert Channel for Data Theft

    Find out how Model Context Protocol (MCP) could be abused as a covert channel for data theft: five real risks, examples, and mitigations.

  • January 21 2026

    DNS Exfiltration: How Hackers Use Your Network to Steal Data Without Detection

    Learn how DNS exfiltration works and why this method of data theft often goes undetected.

  • January 14 2026

    Managing Ransomware Remediation To Reduce Long-Term Damage

    What key steps must organizations follow to ensure effective ransomware remediation in the event of a data breach?

  • January 14 2026

    Developing A Ransomware Backup Strategy Your Business Can Trust

    A clear ransomware backup strategy is a critical part of any firm's defenses. Here's what you need to know.

  • January 14 2026

    Ransomware Protection: A Complete Guide To Preventing Modern Attacks

    What must all firms know in order to improve their ransomware protection strategy for the threats of 2026?