Helen Laidlaw

Helen Laidlaw

IT Systems Analyst
Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.
Flawed Sicarii Ransomware Can't Be Decrypted
Endpoint & Device Security Flawed Sicarii Ransomware Can't Be Decrypted

In the ever-evolving landscape of cyber threats, a new ransomware strain named Sicarii has emerged, not for its sophistication, but for its catastrophic incompetence. To unpack the bizarre nature of this malware, we sat down with Rupert Marais, our in-house security specialist. With deep expertise

What Is WhatsApp's New Lockdown Security Mode?
Endpoint & Device Security What Is WhatsApp's New Lockdown Security Mode?

Introduction In an increasingly connected world where personal data is constantly under threat, the security of our private conversations has never been more critical for those whose work or profile places them at a higher risk of surveillance. As digital threats evolve in sophistication, so too

Is Russia's Cyber War on NATO's Grid Failing?
Infrastructure & Network Security Is Russia's Cyber War on NATO's Grid Failing?

As the winter chill settled over Poland late last year, a far more menacing threat was silently unfolding in the digital realm, targeting the very infrastructure designed to keep the nation warm and powered. On December 29 and 30, 2025, a sophisticated cyberattack aimed to cripple two major

Is SharePoint the New Frontier for Phishers?
Infrastructure & Network Security Is SharePoint the New Frontier for Phishers?

The very digital collaboration tools designed to foster productivity and seamless information sharing are increasingly being weaponized by sophisticated threat actors, turning trusted platforms into Trojan horses for widespread cyberattacks. A recent, highly-coordinated campaign has brought this

State DHS Breaches Expose Data of Nearly 1 Million
Infrastructure & Network Security State DHS Breaches Expose Data of Nearly 1 Million

The security of personal information held by government agencies became a pressing concern as two separate data breaches at state-level Departments of Human Services were announced within a two-week period, collectively exposing the sensitive data of nearly one million residents in Illinois and

Can You Stop a Breach in Less Than 18 Minutes?
Editorial Can You Stop a Breach in Less Than 18 Minutes?

How long does it take for a threat actor to move from initial compromise to lateral movement within a corporate network? Just 18 minutes in mid-2025 , down from 48 minutes the year prior, according to recent industry reporting. This phenomenon, usually referred to as 'breakout time' in the

Are Training Apps a Backdoor to Your Cloud?
Identity & Access Management Are Training Apps a Backdoor to Your Cloud?

The very tools designed to teach cybersecurity best practices are now serving as an unlocked side door for malicious actors to infiltrate the cloud environments of the world's largest companies. A recently published investigation has uncovered a deeply ironic and widespread security flaw in which

Is Your AI Framework Leaking Sensitive Data?
Infrastructure & Network Security Is Your AI Framework Leaking Sensitive Data?

The rapid integration of artificial intelligence into enterprise environments has created a landscape where powerful new tools are being deployed at an unprecedented pace, but this rush to innovate often overshadows a critical examination of the underlying security posture of the frameworks these

Orphan Accounts Are a Silent But Serious Threat
Infrastructure & Network Security Orphan Accounts Are a Silent But Serious Threat

Deep within the digital architecture of countless organizations lie dormant credentials, relics of former employees and forgotten projects, that represent one of the most undermanaged yet potent security vulnerabilities of the modern era. These are not merely inactive entries in a database; they

Flaws in Anthropic Git Server Allow Code Execution
Malware & Threats Flaws in Anthropic Git Server Allow Code Execution

The integration of large language models with development tools has unlocked unprecedented productivity, yet this new frontier of AI-assisted coding introduces complex security challenges that can be exploited in non-traditional ways. A recently disclosed set of three critical security

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later