Hacktivist groups unleashed a wave of cyberattacks targeting governments and critical infrastructure after US–Israel strikes on Iran, revealing the growing role of digital warfare in modern conflicts.
Chinese cyber espionage groups exploited the Gulf conflict to launch sophisticated attacks against Qatar, using fake news lures, PlugX, and Cobalt Strike malware to infiltrate high-value targets.
The Genesis ransomware group has claimed Cornerstone Financial Advisors, INC and several other organizations as new victims in a sweeping attack spanning multiple industries. Learn how this latest spree signals a dangerous escalation in ransomware tactics.
A sophisticated North Korean cybercrime group has orchestrated a wave of attacks on cryptocurrency firms, exploiting critical vulnerabilities and cloud misconfigurations to exfiltrate private keys, source code, and cloud secrets in a campaign that signals escalating risks for the digital asset industry.
As military tensions flare in the Middle East, Iranian state-backed hacker groups are launching a surge of cyberattacks against critical infrastructure worldwide—targeting energy, transportation, and government systems. Discover the key actors, their tactics, and what makes organizations vulnerable.
A new cybercrime campaign uses fake IT support calls and the Havoc C2 framework to infiltrate organizations, moving swiftly from social engineering to technical compromise and persistent network access.
Iran’s intelligence agencies are waging a hybrid war that fuses cyberattacks, espionage, and information operations, with Europe and Italy increasingly in the crosshairs. Here’s how the digital battlefields are shifting—and why resilience matters now more than ever.
A China-developed open-source AI tool, CyberStrikeAI, has powered a wave of global attacks on FortiGate security devices, revealing the growing threat of AI-augmented cyber operations and the blurring line between research and weaponization.
Isidore Quantum, a palm-sized data diode, is setting a new standard for quantum-resistant cybersecurity on edge devices, protecting critical systems against tomorrow’s most advanced cyber threats.
A new front has opened in the ongoing conflict: cyberspace. Pro-Iranian and allied hackers are targeting critical infrastructure and global networks, amplifying chaos and economic disruption far beyond the physical battlefield.