Cyber Risk

Microsoft Disrupts Massive RedVDS Cybercrime Service
Security Operations & Management Microsoft Disrupts Massive RedVDS Cybercrime Service

A monthly subscription priced lower than most streaming services has become the unlikely engine behind millions of dollars in sophisticated financial fraud, a stark reality brought to light by Microsoft's recent takedown of the cybercrime platform RedVDS. In a significant blow to the digital

Is VoidLink a New Class of Linux Cloud Malware?
Security Operations & Management Is VoidLink a New Class of Linux Cloud Malware?

Today we’re speaking with Rupert Marais, our in-house security specialist, to unpack a deeply concerning development in the world of cybersecurity. A newly discovered malware framework, dubbed VoidLink, is poised to change how we think about threats to Linux systems. Far from a simple script, this

NoName057(16) Gamifies Cyberattacks With Its DDoSia Tool
Security Operations & Management NoName057(16) Gamifies Cyberattacks With Its DDoSia Tool

With the rise of politically motivated cyber warfare, the lines between state-sponsored attacks and grassroots activism have become increasingly blurred. To shed light on this evolving landscape, we sat down with Rupert Marais, our in-house security specialist. We explored the inner workings of

How Did Crypto Crime Become a $154B Industry?
Security Operations & Management How Did Crypto Crime Become a $154B Industry?

A shadow economy operating on the blockchain has quietly swelled into a $154 billion industry, driven not just by scattered hackers but by the coordinated efforts of nation-states and sophisticated criminal syndicates. This research summary delves into the explosive 160% growth of the illicit

Is Venezuela the Next Cyber Warfare Battlefield?
Security Operations & Management Is Venezuela the Next Cyber Warfare Battlefield?

In the aftermath of a daring hypothetical raid that saw a world leader captured, the sudden darkness that enveloped Caracas raised a question far more complex than the military operation itself: was the city-wide blackout the result of a sophisticated cyberattack or simply the collateral damage of

Are You Defending Against Threats or Just Exposures?
Security Operations & Management Are You Defending Against Threats or Just Exposures?

In the rapidly evolving landscape of cybersecurity, the old rulebook is being thrown out. For years, we’ve been taught that managing vulnerabilities is the key to security, but a widening chasm has opened between this theory and the reality of how attackers operate. To bridge this gap, we sat down

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later