by Amelia Gomeche | Sep 11, 2025 | Blog
Targeted Phishing Against a High-Value Open Source Maintainer This week, the largest Supply chain hack in history caused massive fallout. On September 8th, John Junon, a Javascript developer, received an email allegedly from npm (Node Package Manager) saying that all...
by Amelia Gomeche | Sep 10, 2025 | Blog
Why Fixing Vulnerabilities After a Penetration Test is Critical for Security and User Privacy Penetration testing is an essential part of a robust cybersecurity strategy. It simulates real-world attacks to identify vulnerabilities before malicious actors can exploit...
by Amelia Gomeche | Sep 3, 2025 | Blog
On Wednesday 3 September 2025, the European Union General Court upheld the EU-US Data Privacy Framework (DPF), dismissing a legal challenge brought by French lawmaker Philippe Latombe. In effect since 2023, the DPF was established to create a framework for...
by Amelia Gomeche | Sep 2, 2025 | Blog
Welcome to September’s edition of our Data Protection monthly news roundup. Read on to find out what’s new in the world of data protection, as well as updates on all things iSTORM. Projects August saw the continuation of several projects from the previous...
by Amelia Gomeche | Aug 13, 2025 | Blog
Securing AI Systems: What is Artificial Intelligence (AI)? Artificial Intelligence (AI) refers to the development of computer systems that can perform tasks typically requiring human intelligence. These tasks include learning, reasoning, problem-solving, perception,...
by Amelia Gomeche | Aug 5, 2025 | Blog
Welcome to August’s edition of our Data Protection monthly news roundup. Read on to find out what’s new in the world of data protection, as well as updates on all things iSTORM. Projects July saw the continuation of several projects from the previous...