Successful operations against Russian Sandworm and Strontium groups targeting Ukraine revealed

Two announcements in two days detail operations against GRU-controlled infrastructure

Read more

Potential cybersecurity impacts of Russia’s invasion of Ukraine

Responding to the crisis in Ukraine must prioritize physical safety, but there are related cyber-risks to consider too.

Read more

Cyclops Blink malware: US and UK authorities issue alert

US and UK authorities have attributed the newly found malware Cyclops Blink to the Russian state-sponsored Sandworm group.

Read more

Cyberinsurance companies don’t want to pay out for “acts of war”

Insurance companies are making exceptions so that they don’t end up paying for damages from an act of war. But which cyberattacks qualify as that?

Read more

US, EU, UK, NATO blame china for “reckless” Exchange attacks

The US, UK, EU, and NATO have have issued a coordinated, public censure of China for its role in attacks against Exchange servers earlier this year.

Read more

Ransomware disrupts food supply chain, Exchange exploitation suspected

The disruption of food logistics company shows how the target isn’t the only victim of a successful ransomware attack.

Read more

A decade in cybersecurity fails: the top breaches, threats, and ‘whoopsies’ of the 2010s

As the 2010s come to a close, we take a snarky walk down memory lane, listing the craziest, most impactful, or simply just awful cybersecurity fails of the decade.

Read more

Compromising vital infrastructure: air traffic control

The aviation industry and air traffic (control) are vital elements of our infrastructure. While flying is reportedly safe, how does that landscape look cybersecurity-wise?

Read more

Compromising vital infrastructure: transport and logistics

Transport and logistics are vital infrastructure, because we need them to deliver our daily necessities, but who is responsible for protecting them?

Read more

BadRabbit: a closer look at the new version of Petya/NotPetya

BadRabbit, a new version of NotPetya, also has an infector allowing for lateral movements. However, unlike NotPetya, it does not use EternalBlue and uses a website to drop its payload. We take a closer look at this new ransomware variant.

Read more

Select your language