The latest tips, commentary and industry expertise from the Cyber Alchemy team.
-
Abuse of Trusted Channels for Modular Infostealer and Malware Delivery
Cybercriminals are increasingly abusing trusted distribution channels, such as open-source platforms, online advertisements, search engines,…
-
The Cyber Response Plan That Actually Works
When a cyber incident hits, the glossy documentation is often useless. Not because people don’t…
-
AI Coding: A Productivity Boom or a Quality Risk?
AI coding tools are changing the game. What used to take hours can now be…
-
How to Spend Smarter on Cybersecurity
When I speak to clients about cybersecurity, one theme comes up again and again –…
-
Are Passkeys the Holy Grail of Business Security?
We’ve all heard it before: “Passwords are the weak link in digital security.” And yet,…
-
Cybersecurity: Why You’re Spending in the Wrong Places
Every so often a client asks:“Do you offer DDoS testing?” And my answer is usually…
-
How Do You Stay Secure as Your Business Grows?
The recent cyberattack against M&S will cost the retailer about £300 million. Similar attacks against…
-
Rethinking Shadow IT: From Risk to Opportunity
Shadow IT often gets a bad reputation, and understandably so. From a traditional security standpoint,…
-
Harnessing DevSecAI: Intelligent Security for AI-Driven Software Delivery
Artificial Intelligence is no longer an R&D side-project; it now sits in production pipelines, powers…
-
Medical Device Regulation UK Update (June 2025): Post-Market Surveillance (PMS) Cybersecurity Requirements
1. Executive summary Medical device compliance landscape in Great Britain (England, Wales, and Scotland) has…
Posts navigation
Featured posts

Got a question?
Speak to an expert about Abuse of Trusted Channels for Modular Infostealer and Malware Delivery.