Cyber Warfare & Cyber Weapons
Cyberсrime and Cyber Warfare
How Did North Korea Infiltrate US Tech Companies?
The pervasive shift to remote work has inadvertently opened a new and insidious gateway for foreign adversaries, allowing them to embed operatives within American corporations from thousands of miles away.
Read More Cyberсrime and Cyber Warfare
Is Iran Spying on Protest Supporters With Malware?
In the fraught landscape of political dissent, the very tools used to share information and organize can be weaponized against those who wield them, a reality underscored by a new cyberespionage campaign targeting supporters of anti-government protes...
Read More Cyberсrime and Cyber Warfare
Trend Analysis: AI-Accelerated Attacks
In the time it takes to get a security alert, attackers may have already breached your network and exfiltrated critical data.
Trend Analysis Read More Cyberсrime and Cyber Warfare
Identity Is the New Battleground in Cybersecurity
The most dangerous intruder on a corporate network today is not a phantom hiding in the shadows but a wolf in sheep’s clothing, using valid credentials to move with impunity and making them nearly impossible to distinguish from a legitimate employee.
Research Summary Read More Cyberсrime and Cyber Warfare
Is Europe Ready for Permanent Hybrid War?
A stark and unsettling reality is crystallizing across the European continent, where the traditional delineations between peacetime and wartime have been irrevocably blurred into a continuous gray zone of confrontation.
Read More Cyberсrime and Cyber Warfare
Can You Defend Against Threats You Cannot See?
In the contemporary and increasingly complex landscape of cybersecurity, the velocity of threat detection and response has become a paramount factor in determining an organization's resilience against malicious attacks, as the extended duration a thr...
Trending
Read More Threats and Vulnerabilities
CISA Warns of New Evasive Brickstorm Malware Variant
A newly identified malware variant, sophisticated enough to erase its own digital footprints by forgoing system-level dependencies, now presents an urgent and escalating threat to critical infrastructure across North America.
Industry Report Read More Cyberсrime and Cyber Warfare
How Did UNC3886 Breach Singapore's Telecoms?
A highly sophisticated cyber espionage campaign, which remained undetected for nearly a full year, successfully infiltrated the core of Singapore's telecommunications sector by exploiting a series of previously unknown vulnerabilities in widely used...
Read More
Get our content freshly delivered to your inbox. Subscribe now ->
Receive the latest, most important information on cybersecurity.








