Cyber Espionage Techniques
Cyberсrime and Cyber Warfare
Identity Is the New Battleground in Cybersecurity
The most dangerous intruder on a corporate network today is not a phantom hiding in the shadows but a wolf in sheep’s clothing, using valid credentials to move with impunity and making them nearly impossible to distinguish from a legitimate employee.
Research Summary Read More Threats and Vulnerabilities
Is a North Korean Spy on Your Company Payroll?
The remote IT contractor who just aced a technical interview and seems like the perfect culture fit could be a highly skilled operative funneling their salary and your company’s secrets directly to a sanctioned state.
Best Practices Guide Read More Cyberсrime and Cyber Warfare
Can You Defend Against Threats You Cannot See?
In the contemporary and increasingly complex landscape of cybersecurity, the velocity of threat detection and response has become a paramount factor in determining an organization's resilience against malicious attacks, as the extended duration a thr...
Trending
Read More Cyberсrime and Cyber Warfare
How Did UNC3886 Breach Singapore's Telecoms?
A highly sophisticated cyber espionage campaign, which remained undetected for nearly a full year, successfully infiltrated the core of Singapore's telecommunications sector by exploiting a series of previously unknown vulnerabilities in widely used...
Read More Cyberсrime and Cyber Warfare
Trend Analysis: African Cybersecurity Maturity
The catastrophic data breach in Senegal, which laid bare the biometric and personal information of a vast portion of the nation's adult populace, serves as a powerful and troubling signal for the entire continent.
Trend Analysis Read More Cyberсrime and Cyber Warfare
Is Your Windows PC Vulnerable to a One-Click Hack?
A single, seemingly innocent click on a link or the opening of a familiar document could be all it takes for malicious actors to seize complete control of a Windows PC, a startling reality brought to the forefront by the discovery of several critical...
Read More Cyberсrime and Cyber Warfare
Streaming Boxes Used in Largest Ever Cyberattack
The seemingly innocuous streaming boxes that have become a common fixture in living rooms around the world have been unmasked as unwitting soldiers in a digital army, contributing to the largest distributed denial of service attack ever recorded.
Read More Cyberсrime and Cyber Warfare
Singapore Telcos Breached in State-Sponsored Cyberattack
A highly sophisticated and coordinated cyber espionage campaign successfully breached the networks of Singapore's four primary telecommunications providers—M1, SIMBA Telecom, Singtel, and StarHub—triggering a massive, 11-month national cyber defense...
Read More
Get our content freshly delivered to your inbox. Subscribe now ->
Receive the latest, most important information on cybersecurity.








