Why One AWS Spot Still Crashes Sites In 2025?

Why One AWS Spot Still Crashes Sites In 2025?

It started innocently enough. Morning coffee, post-workout calm, a quick “Computer, drop in on my son.” Instead of his sleepy grin, I got the polite but dreaded: “There is an error. Please try again later.” -Alexa (i call it “Computer” as a wannabe Capt of NCC1701E) Moments later, I realised it wasn’t my internet or …

Read More Read More

Defence Tech at Risk: Palantir, Anduril, and Govini in the New AI Arms Race

Defence Tech at Risk: Palantir, Anduril, and Govini in the New AI Arms Race

A Chink in Palantir and Anduril’s Armour? Govini and Others Are Unsheathing the Sword When Silicon Valley Code Marches to War A U.S. Army Chinook rises over Gyeonggi Province, carrying not only soldiers and equipment but streams of battlefield telemetry, encrypted packets of sight, sound and position. Below, sensors link to vehicles, commanders to drones, …

Read More Read More

The Npm Breach: What It Reveals About Software Supply Chain Security

The Npm Breach: What It Reveals About Software Supply Chain Security

When a Single Phishing Click Becomes a Global Vulnerability – Meet the Supply Chain’s Weakest Link 1. Phishing-Driven Attack on npm Packages On 8 September 2025, maintainer Qix fell victim to a highly convincing phishing email from [email protected], which led to unauthorised password reset and takeover of his account. Attackers injected malicious code into at …

Read More Read More

When Trust Cracks: The Vault Fault That Shook Identity Security

When Trust Cracks: The Vault Fault That Shook Identity Security

Opening Scene: The Unthinkable Inside Your Digital Fortress Imagine standing before a vault that holds every secret of your organisation. It is solid, silent and built to withstand brute force. Yet, one day you discover someone walked straight in. No alarms. No credentials. No trace of a break-in. That is what the security community woke …

Read More Read More

A Leviathan Awakens: How Palantir Took Over Government AI

A Leviathan Awakens: How Palantir Took Over Government AI

I. Introduction: The Unseen Empire For years, Palantir has been the enigma of Silicon Valley. Once known for its secretive, high-stakes data work with intelligence agencies, it evolved into a cultural force, the nucleus of what many call the “Palantir Mafia.” As explored in previous pieces like Inside the Palantir Mafia: Secrets to Succeeding in …

Read More Read More

Simple Steps to Make Your Code More Secure Using Pre-Commit

Simple Steps to Make Your Code More Secure Using Pre-Commit

Build Smarter, Ship Faster: Engineering Efficiency and Security with Pre-Commit In high-velocity engineering teams, the biggest bottlenecks aren’t always technical; they are organisational. Inconsistent code quality, wasted CI cycles, and preventable security leaks silently erode your delivery speed and reliability. This is where pre-commit transforms from a utility to a discipline. This guide unpacks how …

Read More Read More

Oracle Cloud Breach Is a Transitive Trust Timebomb : Here’s How to Defuse It

Oracle Cloud Breach Is a Transitive Trust Timebomb : Here’s How to Defuse It

The Oracle Cloud breach didn’t just expose 140,000 tenants, it revealed the silent danger of transitive trust across SaaS ecosystems. This post analyses the breach, outlines what could’ve been done, and offers a practical response guide for engineering and security teams. Featuring tools, trust graphs, and lessons for the road ahead.

JP Morgan’s Warning: Ignoring Security Could End Your SaaS Startup

JP Morgan’s Warning: Ignoring Security Could End Your SaaS Startup

The AI-driven SaaS boom, powered by code generation, agentic workflows and rapid orchestration layers, is producing 5-person teams with £10M+ in ARR. This breakneck scale and productivity is impressive, but it’s also hiding a dangerous truth: many of these startups are operating without a secure software supply chain. In most cases, these teams either lack …

Read More Read More

Trump’s Executive Order 14144 Overhaul, Part 2: Analysis of Post Quantum Cryptography Clauses

Trump’s Executive Order 14144 Overhaul, Part 2: Analysis of Post Quantum Cryptography Clauses

While Part 1 explored how the amendment reinforced a sanctions-led approach and repositioned AI policy within the broader cybersecurity doctrine, this second instalment shifts focus to its most understated move — the cryptographic recalibration. Executive Order 14144’s treatment of Post-Quantum Cryptography (PQC) may appear procedural at first glance, but in its omissions and realignments lies …

Read More Read More

Trump’s Executive Order 14144 Overhaul, Part 1: Sanctions, AI, and Security at the Crossroads

Trump’s Executive Order 14144 Overhaul, Part 1: Sanctions, AI, and Security at the Crossroads

Trump’s latest Executive Order 14144 marks a strategic pivot in U.S. cybersecurity policy—narrowing sanctions, revoking digital ID initiatives, and mandating standards for AI and software security. In this first part of a two-part analysis, I unpack the deeper shifts beneath the headlines and highlight what practitioners, policymakers, and tech leaders need to watch.

Bitnami