Cyberсrime and Cyber Warfare
Cyberсrime and Cyber Warfare
Bitfinex Hacker Ilya Lichtenstein Released Early
In a stunning conclusion to one of the most audacious crypto heists ever recorded, Ilya Lichtenstein, the self-admitted architect behind the 2016 Bitfinex breach, has walked free from prison years ahead of schedule.
Profile Article Read More Cyberсrime and Cyber Warfare
Is the ESA Breach a Wake-Up Call for Space Security?
While the European Space Agency officially downplayed the incident as a minor compromise affecting a few external servers, the subsequent leak of over 200 gigabytes of allegedly sensitive data has sent a shockwave through the global space community.
Industry Report Read More Cyberсrime and Cyber Warfare
Why Is ISACA Leading the World's Largest Cyber Program?
The digital sinews connecting hundreds of thousands of defense contractors to the U.S. Department of War represent one of the most critical, and targeted, supply chains on the planet.
Feature Article Read More Cyberсrime and Cyber Warfare
US Federal Contractor Sedgwick Confirms Cyberattack
The digital supply chain for government services has once again proven a prime target for cybercriminals, with this latest incident underscoring vulnerabilities inherent in third-party contractor relationships.
Read More Cyberсrime and Cyber Warfare
Kraken User Data Allegedly for Sale on Dark Web for $1
An alarming listing has surfaced on a dark web marketplace that is sending ripples of concern throughout the cryptocurrency community, alleging that internal access to the Kraken exchange’s support panel is available for purchase for the nominal fee...
Read More Cyberсrime and Cyber Warfare
Is the FTC Softening Its Stance on Data Breaches?
The Federal Trade Commission recently underscored its role as a key enforcer of digital privacy and security by announcing proposed consent orders with two disparate firms, Illuminate Education and Illusory Systems, following catastrophic cybersecuri...
Trending
Read More Cyberсrime and Cyber Warfare
AI Supercharges the Cyber Extortion Threat
The once-clear line between a legitimate corporate communication and a sophisticated phishing attempt has been irrevocably blurred by artificial intelligence, transforming cyber extortion from a manageable risk into an existential business threat.
Best Practices Guide Read More Cyberсrime and Cyber Warfare
Is Your Business Ready for the NIS2 Directive?
The regulatory ground beneath the European Union's digital economy has irrevocably shifted, marking a new era of cybersecurity accountability that extends far beyond the confines of traditionally defined critical infrastructure.
Read More
Get our content freshly delivered to your inbox. Subscribe now ->
Receive the latest, most important information on cybersecurity.








