
Weekly Intelligence Snapshot – Week 4
This week, we report on an old acquaintance striking with a new Unified Extensible Firmware Interface (UEFI) rootkit dubbed MoonBounce.

This week, we report on an old acquaintance striking with a new Unified Extensible Firmware Interface (UEFI) rootkit dubbed MoonBounce.

This week, we look at the recent attack on Ukrainian government websites, which further stoked already escalating tensions between Ukraine

Cybersecurity continues to be a pressing topic for organizations from all industries. And the ongoing rise of ransomware attacks will

This week, we cover Patch Tuesday. Microsoft addresses six zero-days and a wormable vulnerability, and Adobe and SAP address critical

The first edition of our Weekly Intelligence Summary of 2022 is here. It highlights Konni, a new variant of malware

We are happy to announce that the Federal Association for IT Security TeleTrusT accredited us with the label “IT Security

PolitikerInnen werden aus unterschiedlichen Gründen immer wieder von Cyber-Kriminellen attackiert. Besonders ausländische Akteure zeigen dabei großes Interesse an nationalen Wahlen.

Politicians are being targeted by cybercriminals all the time for a variety of reasons. Foreign threat actors show great interest

Business travelers face a unique risk of being targeted by cybercriminals. This brief article collects our most valuable tips for

The situation in Afghanistan remains in flux, and key economic, political, and diplomatic issues continue to evolve. While these issues
Try searching our blog

CrowdStrike Catches Insider Feeding Information Scattered Lapsus$ Hunters Collective | German Bundestag Passes Law Implementing NIS2 Directive

Global WrtHug Campaign Targets ASUS Routers, Over 50,000 Devices Compromised | European Commission Unveils New Digital Package Addressing AI and Cybersecurity Rules

Researchers Find APT Campaign Targeted Cisco And Citrix Vulnerabilities Before Disclosure | Germany Links Belgium Drone Incidents To Frozen Russian Assets Dispute

New AI-Powered Malware Families Leveraging LLMs for Self-Modifying Code, Evasion, and Data Theft | European Commission Authorizes Coalition of EU Countries To Build Sovereign Digital Infrastructure