CISO Advisory
CISO
How to Develop a Strong Security Culture – Advice for CISOs and CSOs
Developing a strong security culture is one of the most critical responsibilities for today’s CISOs (Chief Information Security Officers) and CSOs (Chief Security Officers).
As...
cyber security
DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs
Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce and Anubis ransomware operators in 2025.
These groups are adapting to...
Cyber Attack
“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands
Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed "Power Parasites," targeting prominent energy companies and major global brands across...
cyber security
Threat Actors Register Over 26,000 Domains Imitating Brands to Deceive Users
Researchers from Unit 42 have uncovered a massive wave of SMS phishing, or "smishing," activity targeting unsuspecting users.
Since the FBI's initial warning in April...
Cyber Attack
Russian Hackers Attempt to Sabotage Digital Control Systems of Dutch Public Service
The Dutch Defense Ministry has revealed that critical infrastructure, democratic processes, and North Sea installations in the Netherlands have become focal points for Russian...
APT
North Korean APT Hackers Pose as Companies to Spread Malware to Job Seekers
Silent Push Threat Analysts have uncovered a chilling new cyberattack campaign orchestrated by the North Korean Advanced Persistent Threat (APT) group known as Contagious...
AI
North Korean Hackers Exploit GenAI to Land Remote Jobs Worldwide
A groundbreaking report from Okta Threat Intelligence reveals how operatives linked to the Democratic People’s Republic of Korea (DPRK), often referred to as North...
Cyber Attack
Threat Actors Target Organizations in Thailand with Ransomware Attacks
Thailand is experiencing a significant escalation in ransomware attacks, with both state-sponsored advanced persistent threat (APT) groups and cybercriminal organizations zeroing in on key...
Join our community of SUBSCRIBERS and be part of the conversation.
To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.