
Weekly Intelligence Snapshot – Week 4
This week, we report on an old acquaintance striking with a new Unified Extensible Firmware Interface (UEFI) rootkit dubbed MoonBounce.
This week, we report on an old acquaintance striking with a new Unified Extensible Firmware Interface (UEFI) rootkit dubbed MoonBounce.
This week, we look at the recent attack on Ukrainian government websites, which further stoked already escalating tensions between Ukraine
Cybersecurity continues to be a pressing topic for organizations from all industries. And the ongoing rise of ransomware attacks will
This week, we cover Patch Tuesday. Microsoft addresses six zero-days and a wormable vulnerability, and Adobe and SAP address critical
The first edition of our Weekly Intelligence Summary of 2022 is here. It highlights Konni, a new variant of malware
We are happy to announce that the Federal Association for IT Security TeleTrusT accredited us with the label “IT Security
PolitikerInnen werden aus unterschiedlichen Gründen immer wieder von Cyber-Kriminellen attackiert. Besonders ausländische Akteure zeigen dabei großes Interesse an nationalen Wahlen.
Politicians are being targeted by cybercriminals all the time for a variety of reasons. Foreign threat actors show great interest
Business travelers face a unique risk of being targeted by cybercriminals. This brief article collects our most valuable tips for
The situation in Afghanistan remains in flux, and key economic, political, and diplomatic issues continue to evolve. While these issues
Try searching our blog
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.
China-linked Espionage Campaigns Target Over 70 Organizations Worldwide | Italy’s Anti-Ransomware Strategy Bill Now Discussed In the Parliament