
Weekly Intelligence Snapshot – Week 4
This week, we report on an old acquaintance striking with a new Unified Extensible Firmware Interface (UEFI) rootkit dubbed MoonBounce.

This week, we report on an old acquaintance striking with a new Unified Extensible Firmware Interface (UEFI) rootkit dubbed MoonBounce.

This week, we look at the recent attack on Ukrainian government websites, which further stoked already escalating tensions between Ukraine

Cybersecurity continues to be a pressing topic for organizations from all industries. And the ongoing rise of ransomware attacks will

This week, we cover Patch Tuesday. Microsoft addresses six zero-days and a wormable vulnerability, and Adobe and SAP address critical

The first edition of our Weekly Intelligence Summary of 2022 is here. It highlights Konni, a new variant of malware

We are happy to announce that the Federal Association for IT Security TeleTrusT accredited us with the label “IT Security

PolitikerInnen werden aus unterschiedlichen Gründen immer wieder von Cyber-Kriminellen attackiert. Besonders ausländische Akteure zeigen dabei großes Interesse an nationalen Wahlen.

Politicians are being targeted by cybercriminals all the time for a variety of reasons. Foreign threat actors show great interest

Business travelers face a unique risk of being targeted by cybercriminals. This brief article collects our most valuable tips for

The situation in Afghanistan remains in flux, and key economic, political, and diplomatic issues continue to evolve. While these issues
Try searching our blog

Suspected Chinese APT Salt Typhoon Targets Italian IT Service Provider | US Treasury Warns Shippers Not To Pay Hormuz Tolls, Even In Form of Charity

TeamPCP Deploys Self-Replicating npm Worm Across Multiple Software Supply Chain Vectors | China Bans Dual-Use Item Exports To Seven European Entities Over Taiwan Arms Sales

The Gentlemen Accelerates Ransomware Operations Through Scalable Affiliate Model | Russia Threatens European Drone Producers, Publishes Addresses Online

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance