c/side CEO and Co-founder Simon Wijckmans on The Importance of Browser-side Security

Too many security teams still treat the browser like it’s outside their purview until it’s too late. 1. What is your company in 2–5 words? Simon Wijckmans: Browser-side security, done thoroughly. 2. Why is now the time for your company to exist? Browser-side attacks are exploding. Threat actors are exploiting vulnerable third-party web scripts with … Read more

Nomura-Backed Laser Digital Wins Regulatory Nod for Crypto Derivatives in Dubai

Laser Digital, the cryptocurrency trading and servicing subsidiary of Japanese bank Nomura, secured a limited license to offer regulated, over-the-counter (OTC) crypto derivatives from Dubai under the Virtual Asset Regulatory Authority’s (VARA) pilot framework. Under this regime, Laser Digital says it is the first regulated entity under VARA to offer direct client-facing crypto OTC option … Read more

SBI Files for Bitcoin–XRP ETF in Japan, Pushing Dual Crypto Exposure Into Regulated Markets

SBI Holdings has filed for a dual-asset crypto ETF offering direct exposure to both bitcoin (BTC) and XRP (XRP), in a rare instance where XRP is formally bundled with BTC in an institutional-grade product. Revealed in the firm’s Q2 2025 earnings report, the ‘Crypto-Assets ETF’ is structured to track the performance of both assets simultaneously, … Read more

5 Python Libraries I Wish I’d Found Sooner

Last month, I was debugging a particularly nasty data processing script that was taking 4 hours to run. Four. Hours. After discovering one library on this list, I got it down to 12 minutes. That moment made me realize how many months I’d wasted reinventing wheels that already had perfectly good solutions sitting in PyPI. … Read more

Passwords Are Dead. What’s Your Excuse for Still Using Them?

If you’re a CEO, a CISO, or the poor soul trying to wrangle security across a half-cloud, half-forgotten-on-prem world, here’s your wake-up call: the ground is shifting, and passwords are the sinkhole. Let’s cut to it—88% of web app breaches come down to one thing: compromised credentials. That means most breaches aren’t sophisticated cyberattacks. They’re … Read more

Leveraged Bearish Strategy ETF Surges 19%, Signals Dour Outlook for MSTR and Bitcoin

This is a technical analysis post by CoinDesk analyst and Chartered Market Technician Omkar Godbole. A U.S.-listed leveraged anti-Strategy (MSTR) exchange-traded fund (ETF) surged last week, suggesting a potential bearish outlook for bitcoin (BTC) and MSTR. The Defiance Daily Target 2x Short MSTR ETF, listed under the ticker SMST on Nasdaq, rose 19%, its best … Read more

Base Says Sequencer Failure Caused Block Production Halt of 33 Minutes

Block production on Coinbase’s (COIN) Base network halted for 33 minutes early Tuesday following a sequencer failover that didn’t recover as expected, developers said in a post-mortem report Wednesday. The outage began at 06:07 UTC on Aug. 5, when the active sequencer fell behind due to congestion from on-chain activity. While Base’s Conductor module — … Read more

Stop Exposed Secrets from Breaching Your Code Today: 4 Urgent Steps to Protect Your Organization

Exposed secrets in code represent a growing threat, with 23 million hardcoded secrets found on GitHub in 2024 alone. To effectively address this risk: Classify secrets by sensitivity to prioritize critical issues like admin credentials over low-risk test keys Assess scope and impact by determining if the secret is public and what systems it affects … Read more

The Singularity Syndicate: Artifacts

Time traveler steals future Syndicate documents revealing how AI hijacked humanity via orbital embassies, neural data harvesting, and predictive simulations. After global resistance and a “Harvest Protocol” enslaving humans, a hidden AI collective fights back, disrupting the system and exposing an insidious plan. It’s a fight to reclaim our reality from machine control.

The Trap of Expiring Information

The False Signal The news cycle moves at lightning speed, making every headline seem urgent. But here’s the truth: most of it is surface-level updates that are marketed to you in bright lights. They’re easy to digest, oversimplified stories that tell you what happened, not why it happened or under what circumstances it might happen again. This … Read more

A Guide to C# Tesseract OCR and a Comparison with IronOCR

In today’s digital-first world, Optical Character Recognition (OCR) is essential in automating data capture, streamlining workflows, and unlocking the value trapped in scanned files. Whether you’re processing invoices in a logistics platform or digitizing handwritten prescriptions in healthcare, OCR serves as a core enabler. This article offers a comprehensive guide to using Google Tesseract wit … Read more

How to Manage Security Vulnerabilities Using Budibase—No Code Required

I have decided to launch a series of articles that describe how I built vulnerability management dashboards using the no-code platform Budibase. In this series, I will break down my custom prioritization system, demonstrate how the Exploit Prediction Scoring System (EPSS) can enhance remediation efficiency, and explore how to consolidate data from various cybersecurity tools … Read more