Blog

Blog
Assessment of Hacktivist Threats to India in Context of APT36 Espionage Activities

A recent surge in reported hacktivist attacks against India’s digital infrastructure has raised concerns, with claims of over 100 breaches…

Blog
Moldova Detains Individual Associated with DoppelPaymer Ransomware Operations

Moldovan law enforcement agencies have successfully apprehended a 45-year-old suspect implicated in DoppelPaymer ransomware attacks that targeted Dutch entities in…

Blog
Criminal Proxy Network Compromises Thousands of IoT Devices

A criminal proxy network has been identified as infecting thousands of Internet of Things (IoT) and end-of-life (EoL) devices, repurposing…

Blog
#2025 Security Summit: Experts to Illuminate Vendor Supply Chain Resilience

The vendor supply chain comprises a complex ecosystem of hundreds, if not thousands, of third-party suppliers, presenting significant cybersecurity challenges…

Blog
ASUS Addresses Remote Code Execution Vulnerabilities in DriverHub Accessible through HTTP and Malicious .ini Files

ASUS has implemented security updates to rectify two critical vulnerabilities affecting the ASUS DriverHub software. These flaws, if successfully exploited,…

Blog
Weekly Summary: Zero-Day Vulnerabilities, Developer Malware Threats, IoT Botnet Developments, and AI-Driven Fraud Techniques

What do a source code editor, a smart billboard, and a web server have in common? These elements have all…