Beyond the Headlines CyberWatch CyberWatch Insights Incidents Insights News Threat Analysis Insights European Commission Orders TikTok to Preserve Data on Romanian Election Under Digital Services Act The European Commission issued a retention order to TikTok on December 6, 2024, mandating the need to keep… byAlex MDecember 6, 2024
Career Hub Software Development From Web Development to Cybersecurity – A Decade of Lessons This article is not a guide. It is more of a reflection that may include some guides. The… byAlex MDecember 3, 2024
CyberWatch Insights Insights Threat Analysis Insights DNS Sitting Ducks: Inside the Mass Hijacking of Misconfigured Domains A wave of sophisticated attackers is turning misconfigured domains into weapons, and the numbers are alarming. No less… byAlex MDecember 2, 2024
Advanced Techniques Cybersecurity Guides Application Security 101: Understanding DevSecOps – A Developer’s Guide What is DevOps security? Known easily as DevSecOps, the definition is pretty much straightforward: integrating security practices into… byAlex MNovember 29, 2024
Alerts CyberWatch News Is Your D-Link Router or NAS 5+ Years Old? Chances are Critical Flaws Won’t Be Patched Security researcher Chaio-Lin Yu (Steven Meow) has discovered multiple critical vulnerabilities in D-Link DSL6740C routers. After the findings,… byAlex MNovember 27, 2024
AI Cybersecurity Guides Fundamentals Insights Cybersecurity 101: OWASP Top 10 for LLM Applications, updated for 2025 In an expected turn of events, OWASP has released the Top 10 for Large Language Models, updated for… byAlex MNovember 26, 2024
Cybersecurity Guides Fundamentals Cybersecurity 101: Understanding MITRE ATT&CK Framework Traditional security frameworks often fail to connect with the realities of development. Usually, we see the results of… byAlex MNovember 25, 2024
Guides Backup Strategies for Home & Self-Hosted Solutions After setting up your self-hosted environment, establishing a solid backup strategy is important. This guide applies to home… byAlex MNovember 22, 2024
Cybersecurity Guides Web Application Security Web Security 101: Understanding Cross-Origin Resource Sharing (CORS) Continuing the web security headers series, after covering HSTS (Strict Transport Security), and CSP (Content Security Policy), now… byAlex MNovember 20, 2024
CyberWatch Incidents News Critical Authentication Bypass Found in Really Simple Security: 4M WordPress Sites at Risk Wordfence’s Threat Intelligence team has identified a critical authentication bypass vulnerability affecting over 4 million WordPress sites that… byAlex MNovember 19, 2024