
Weekly Intelligence Snapshot – Week 4
This week, we report on an old acquaintance striking with a new Unified Extensible Firmware Interface (UEFI) rootkit dubbed MoonBounce.

This week, we report on an old acquaintance striking with a new Unified Extensible Firmware Interface (UEFI) rootkit dubbed MoonBounce.

This week, we look at the recent attack on Ukrainian government websites, which further stoked already escalating tensions between Ukraine

Cybersecurity continues to be a pressing topic for organizations from all industries. And the ongoing rise of ransomware attacks will

This week, we cover Patch Tuesday. Microsoft addresses six zero-days and a wormable vulnerability, and Adobe and SAP address critical

The first edition of our Weekly Intelligence Summary of 2022 is here. It highlights Konni, a new variant of malware

We are happy to announce that the Federal Association for IT Security TeleTrusT accredited us with the label “IT Security

PolitikerInnen werden aus unterschiedlichen Gründen immer wieder von Cyber-Kriminellen attackiert. Besonders ausländische Akteure zeigen dabei großes Interesse an nationalen Wahlen.

Politicians are being targeted by cybercriminals all the time for a variety of reasons. Foreign threat actors show great interest

Business travelers face a unique risk of being targeted by cybercriminals. This brief article collects our most valuable tips for

The situation in Afghanistan remains in flux, and key economic, political, and diplomatic issues continue to evolve. While these issues
Try searching our blog

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack | EU Parliament Adopts Position On AI Regulation Proposal