
Brexit, Cybersecurity & Data Protection: Everything you need to know about the EU-UK Trade Deal
The Brexit transition period has ended. On 24 December 2020 the EU and UK reached the Trade and Cooperation Agreement
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

The Brexit transition period has ended. On 24 December 2020 the EU and UK reached the Trade and Cooperation Agreement

In the following blog post, we will provide an overview of the major cyber security trends observed over 2020 and

In this second blog post in our series on Geopolitics in Cyber Threat Intelligence, we will explain what is meant

The cyber-threat landscape increased significantly this year due to the COVID-19 pandemic caused by accelerated digitization and the sudden shift

Our declassified threat intelligence analysis on a APT28 spear phishing campaign delivering Zebrocy malware to target at least a government

In this blog, we explain how TIBER-EU tests are conducted and describe the role of the Threat Intelligence Provider in

You can find here the latest threat intelligence updates on the new BlackWater Malware campaign using the Beirut tragedy to

Learn more about the Golden Chickens Malware-as-a-Service tool updates observed in recent malware campaigns against the financial, retail, and chemical

This post is the first part of a two-part blog series in which we will explain the TIBER-EU framework and
This post is the first in a series of five short blogposts, in which we will explain why geopolitics is
Try searching our blog

The Gentlemen Accelerates Ransomware Operations Through Scalable Affiliate Model | Russia Threatens European Drone Producers, Publishes Addresses Online

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue