Author Archives: Tahir

The 72-Hour Race: Why AI-Driven Discovery is Testing the Limits of Governance

The “luxury of time” in cybersecurity just evaporated. Recent reports indicate that U.S. officials at CISA are considering a radical policy shift: cutting the remediation window for exploited flaws from the typical two weeks down to just three days. The … Continue reading

Posted in Artificial Intelligence, Data Breaches, Generative AI | Tagged , , , , , , , , | Comments Off on The 72-Hour Race: Why AI-Driven Discovery is Testing the Limits of Governance

Cyber Insurance — Insured on Paper. Void in Practice.

Why paying the premium is only half the equation — and why continuous oversight and clear reporting hold the missing piece. The ransomware hits at 2am. Data is exfiltrated. Operations grind to a halt. Your team scrambles, invokes the incident … Continue reading

Posted in Ransomware, Uncategorised | Leave a comment

The Fourth Pillar? Making the Case for Cybersecurity in ESG

Global ransomware attacks surged by 45% in 2025, with over 9,200 incidents recorded worldwide – the highest volume on record. This dramatic rise underscores that cybersecurity threats are no longer just IT issues; they are now central to companies sustainability … Continue reading

Posted in Uncategorised | Tagged , | Leave a comment

From BSOD to EDR: A Simple Explanation of the Recent IT Meltdown

By now, almost everyone has heard about CrowdStrike and the global IT outage caused by a buggy update to one of their software components. This incident, which affected businesses and organizations worldwide, has been a hot topic in tech news … Continue reading

Posted in IT Incidents | Tagged , , , | Leave a comment

Sandboxing for Success: The Key to Unleashing Generative AI in Banking

Innovation is the lifeblood of progress, especially in the dynamic landscape of financial institutions. However, as these institutions navigate the ever-evolving digital realm, they often find themselves shackled by stringent security protocols and regulatory requirements. Among the casualties of this … Continue reading

Posted in Artificial Intelligence, Generative AI | Tagged , , , , , , | Leave a comment

Deepfakes: Decoding and Defending An Introduction

The term “deepfake” is a combination of “deep learning” and “fake”. These fakes are created using algorithms that are trained to mimic human behavior. It’s a place where reality and fiction blur together, leaving us questioning what’s real and what’s not. Continue reading

Posted in Artificial Intelligence, DeepFakes, Ransomware | Tagged , , , , | Comments Off on Deepfakes: Decoding and Defending An Introduction

Cloud Cost Optimization: Best Practices with Examples

In the wake of the COVID-19 pandemic, businesses worldwide faced unprecedented challenges that accelerated the adoption of cloud technologies. The shift to remote work, digital transformation, and the need for scalable solutions prompted organizations to migrate their operations to the … Continue reading

Posted in Cloud Computing | Tagged , , , , , | Comments Off on Cloud Cost Optimization: Best Practices with Examples

TalkTalk website hacked: it means my personal details are compromised :-(

The last week’s news came out direct from TalkTalk was a personal shock to me as I am also one of their customer and now I have been a victim of this cyber attack. The first thing I wanted to … Continue reading

Posted in Data Breaches | Comments Off on TalkTalk website hacked: it means my personal details are compromised :-(

Underworld of Hackers; how they work and what you can do to protect yourself

Always wonder, what is the value of your personal information to hackers, why they want it and what potential threats may be on your way, once they have it? In this article you will not only see how underworld of … Continue reading

Posted in Online Safety | Comments Off on Underworld of Hackers; how they work and what you can do to protect yourself

GCHQ employs: dyslexic and dyspraxic spies

I came across an interesting article published in Sunday Telegraph about the employment of dyslexic young people by GCHQ. More than 100 dyslexic and dyspraxic ‘neuro diverse’ analysts were employed so far. Unfortunately in many countries of the world, this … Continue reading

Posted in Nation-State | Comments Off on GCHQ employs: dyslexic and dyspraxic spies

Free Site Recovers Files Locked By Cryptolocker

Previously, I shared some info about Cryptolocker (ransomware), discovered in September 2013 which is a malware that encrypts a windows user’s data files including documents, photos and music. So what was the only option for a Windows user to get that … Continue reading

Posted in Ransomware | Comments Off on Free Site Recovers Files Locked By Cryptolocker

Why most credit hacks happening in US?

In recent years, more than 80 countries have upgraded to credit cards embedded with microchips. Cards with chips are inconceivably difficult to counterfeit, and there’s added security in every swipe: Terminals require a user’s PIN, and the information on the … Continue reading

Posted in Data Breaches | Comments Off on Why most credit hacks happening in US?

Wow….You’re infected—if you want to see your data again, pay us $300 in Bitcoins

Malware that takes computers hostage until users pay a ransom is getting meaner, and thanks to the growing prevalence of Bitcoin and other digital payment systems, it’s easier than ever for online crooks to capitalize on these “ransomware” schemes. If … Continue reading

Posted in Ransomware | Comments Off on Wow….You’re infected—if you want to see your data again, pay us $300 in Bitcoins