
Has DarkSide Dug Its Own Grave With the Ransomware Attack on Colonial Pipeline?
DarkSide’s ransomware attack on Colonial Pipeline has brought dark shadows over the group from inside the cybercriminals community. Will ransomware
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

DarkSide’s ransomware attack on Colonial Pipeline has brought dark shadows over the group from inside the cybercriminals community. Will ransomware

The death of the third-party cookie is near. Introducing new privacy-friendly features and alternatives to increase data security.

An unsecured database consisting of 533 million Facebook users’ data was made publicly available last week and raises the necessity

aSince uncovering the Malware-as-a-service provider “Golden Chickens” back in 2018, we are carefully tracking the evolution of the Golden Chickens

The EU Council officially adopted conclusions for the new Cybersecurity Strategy. Check out our overview of the three focus areas!

QuoIntelligence analyzed China’s 14th Five-Year Plan draft, which sets goals and strategies for developing the country’s economy. Read our summary

IT security and rising cybercrime activities is a growing area of concern across many organizations. Here are ten essential areas,

DoH provides the benefit of communicating DNS information over an encrypted HTTPS connection but presents security issues for organizations.

In occasion of the #SaferInternetDay2021, we prepared a compilation of Top 3 Digital Threats organizations and their leaders should be

Supply chain attacks are on the rise in 2021. The recent SolarWind breach and COVID-19 are only exacerbating supply chain
Try searching our blog

The Gentlemen Accelerates Ransomware Operations Through Scalable Affiliate Model | Russia Threatens European Drone Producers, Publishes Addresses Online

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue