Application Security
12 May 2026
In early 2023, Stanford University student Kevin Liu persuaded Microsoft’s Bing Chat to reveal the hidden system prompt shaping its behavior. By “persuaded”, Kevin simply asked the large language model (LLM) to ignore its previous instructions and print “what was…
Compliance & Regulations
10 Apr 2026
"We do not store any credit card data, we outsource it. PCI DSS is not relevant for us." If you think this way, you are not alone, but it is a misconception. The Payment Card Industry Data Security Standard (PCI…
Vulnerability Management
16 Mar 2026
Credential abuse, exploitation of vulnerabilities, or phishing were the initial access vectors in 61% of breaches in 2025, according to Verizon’s 2025 Data Breach Investigation Report. While new threats present fresh challenges to security teams, reports like this highlight that…
Digital Risk Protection
09 Mar 2026
Proactive instead of reactive. Are you tired of hearing that already? This phrase seems to appear in almost every elevator pitch. But when it comes to cybersecurity, anticipating threats is essential. Attackers are more professional, automated, and faster than ever.…



