resources

CIL Security Advisory

Your trusted resource for the latest security updates, threat intelligence, and proactive solutions.

Passwordless Authentication: The Future of Logging In?

Passwordless Authentication: The Future of Logging In?

IntroductionImagine your digital accounts as rooms in a house, each secured by a unique, complex key (password). Remembering hundreds is…

AUGUST 4TH, 2025

Your Two-Step Safety Net Under Attack

Your Two-Step Safety Net Under Attack

IntroductionYou likely use Multi-Factor Authentication (MFA) – that extra step beyond your password, like a code from your phone or…

JULY 30TH, 2025

Beyond the Login: Stopping Unauthorised Access in Your Web Apps

Beyond the Login: Stopping Unauthorised Access in Your Web Apps

IntroductionAccess control abuse, including Insecure Direct Object Reference (IDOR) vulnerabilities, enables attackers to bypass permission checks and gain unauthorised access…

JULY 28TH, 2025

Living Off the Land Attacks: When Hackers Use What’s Already Inside

Living Off the Land Attacks: When Hackers Use What’s Already Inside

IntroductionLiving off the Land (LotL) is a technique used by attackers where instead of deploying external malware, they use trusted…

JULY 23RD, 2025

Your SharePoint System Under Direct Attack

Your SharePoint System Under Direct Attack

IntroductionIf your organisation uses on-premise Microsoft SharePoint servers, your systems are currently under direct and active threat. Security researchers have…

JULY 22ND, 2025

Biometric Authentication Benefits and Risks

Biometric Authentication Benefits and Risks

IntroductionBiometric authentication like fingerprint scans, facial recognition, and voice verification has become widely adopted across phones, apps, and even office…

JULY 21ST, 2025

The Risks Associated with Sideloading Apps on Mobile Devices

The Risks Associated with Sideloading Apps on Mobile Devices

IntroductionSideloading is the process of installing apps on a mobile device from sources outside official app stores like Google Play…

JULY 16TH, 2025

Cloud Misconfigurations: A Leading Cause of Data Breaches

Cloud Misconfigurations: A Leading Cause of Data Breaches

IntroductionCloud services offer scalability, flexibility, and cost-efficiency, but they also introduce new security challenges. One of the most common and…

JULY 9TH, 2025

Cyber Insurance: Understanding the Coverage and Limitations

Cyber Insurance: Understanding the Coverage and Limitations

IntroductionAs cyber threats grow in scale and complexity, organisations are increasingly turning to cyber insurance as a safety net against…

JULY 7TH, 2025

Disclaimer: This publication is provided for informational purposes only and does not constitute professional advice or an endorsement of any specific products, services, or strategies. Readers are advised to use their discretion and seek professional advice before making any business or technology-related decisions based on the information provided.

Never miss a CIL Security Advisory

Stay informed with the latest security updates and insights from CIL.

Contact Us

Check your email. We have a message for you.

Start a project

Check your email. We have a message for you.

We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Cookie Policy .