Cyber Espionage Techniques
Cyberсrime and Cyber Warfare
Hackers Widely Exploit Patched WinRAR Vulnerability
A critical vulnerability within the widely used WinRAR file compression software continues to be a potent weapon for a diverse array of threat actors, even though a security patch was issued more than six months ago.
Read More Cyberсrime and Cyber Warfare
Asymmetric Security Raises $4.2M for AI Cyber Defense
As the digital landscape becomes increasingly fraught with sophisticated threats, the critical window for responding to a security breach is shrinking, placing immense pressure on cyber defense teams to act with unprecedented speed and precision.
Read More Cyberсrime and Cyber Warfare
BreachForums Hacked, Exposing 324,000 Members
In a move that sent shockwaves through the digital underground, the very marketplace designed for trading stolen data found itself gutted and exposed, its secrets laid bare for the world to see.
Feature Article Read More Cyberсrime and Cyber Warfare
Critical Infrastructure Faces a Surge in Cyber-Attacks
The intricate web of digital controls that powers our modern world, from turning on the lights to purifying water, is now a primary battleground for adversaries seeking to inflict widespread disruption.
Industry Report Read More Cyberсrime and Cyber Warfare
Kraken Support Data Breach Claim Highlights Human Risk
An unverified claim circulating on dark web forums has once again cast a spotlight on the persistent vulnerability of the human element within the cryptocurrency industry’s security framework.
Read More Cyberсrime and Cyber Warfare
Cyber Fraud vs. Ransomware: A Comparative Analysis
The long-held consensus that ransomware is the undisputed king of cyber threats is being fundamentally challenged, as a new report indicates that corporate leaders now fear the pervasive and insidious nature of cyber-enabled fraud even more.
Comparison Article Read More Cyberсrime and Cyber Warfare
Sophos CISO Warns of North Korean IT Scams
The seemingly perfect remote developer a company just hired, one who demonstrated exceptional skill during technical interviews and possessed a flawless resume, could be a highly disciplined operative working for a state-sponsored entity.
Read More Cyberсrime and Cyber Warfare
How Do You Align Security and Compliance?
In the intricate digital ecosystem of the modern enterprise, the lines between robust cybersecurity and stringent regulatory compliance have blurred into a single, critical imperative for survival and growth.
Read More
Get our content freshly delivered to your inbox. Subscribe now ->
Receive the latest, most important information on cybersecurity.








