A safer digital society starts in the code

Between 2025 and 2026, threats to business-critical systems are intensifying, from targeted intrusions and extortion to supply-chain attacks via vendors. AI is used both as a tool and as an attack surface, and the convergence of IT and OT is causing real operational disruptions. The conclusion is clear: security must be built in from the

With great (vibe) power comes great (security) responsibility

AI has made it possible for almost anyone to vibe-code to build apps, integrations, and automations without being a developer. It’s creative, fun, and fast. But it also means that many people are building systems they don’t fully understand how they work or what lies beneath the surface. Code is generated, third-party packages are pulled

Is your organization truly secure?

YES, we follow established industry standards.We rely on proven frameworks such as ISO 27001, the NIST Cybersecurity Framework, and OWASP to create structure and confidence. But… the reality further down in the organization often looks very different: And we see another major blind spot:We tend to focus on external threats, but what happens when the

One of the largest attacks on NPM in history

On September 8, 2025, a sophisticated supply-chain attack targeted 18 widely used NPM packages (Node Package Manager).Together, these packages account for 2.8 billion downloads per week, making this one of the largest NPM attacks ever recorded. What is a supply-chain attack? A supply-chain attack is a type of cyberattack where the attacker does not target