$ page 11/35

Anatomy of a swarm: Deconstructing Russia's hybrid drone attacks on Ukraine

A deep dive into Russia's large-scale drone attacks on Ukraine, analyzing the cyber-physical technology, the impact on critical infrastructure, and st

6 min readApr 4

XR headsets could use your skull's vibrations to log you in

Emerging research details a biometric system that uses the unique skull vibrations from a user's heartbeat and respiration to provide continuous authe

2 min readApr 4

Blast radius of TeamPCP attacks expands amid hacker infighting

A complex web of supply chain attacks, data breaches, and conflicting claims from groups like TeamPCP, Lapsus$, and ShinyHunters creates chaos for def

6 min readApr 4

Beyond the missiles: A deep dive into Iran's state-sponsored cyber arsenal

While headlines focus on Iran's missile program, its state-sponsored cyber arsenal poses a more immediate threat through espionage and destructive att

6 min readApr 4

Microsoft begins force-upgrading Windows 11 PCs to unreleased 24H2 version

Microsoft is automatically upgrading some Windows 11 23H2 PCs to the unreleased 24H2 version, raising concerns over stability and user control.

2 min readApr 4

Beyond the strait: Iran's cyber threat to global maritime and energy sectors

Geopolitical tensions in the Strait of Hormuz have a cyber dimension, with Iranian APTs targeting maritime and energy sectors with destructive malware

6 min readApr 4

A 'pre-war era': Analyzing the cybersecurity implications of Poland's warning to Europe

Polish PM Donald Tusk's warning of a 'pre-war era' highlights the critical cybersecurity threat from Russia's hybrid warfare against a divided Europe.

7 min readApr 4

How Russia's military draft order opens the door for cyberattacks

Russia's military mobilization order is more than a geopolitical issue; it has created a fertile ground for cyberattacks, including phishing and insid

6 min readApr 4

When diplomacy becomes a weapon: The cyber fallout of the Trump-Europe standoff over Iran

An analysis of how a 2019 geopolitical threat against European allies created a shadow battleground for state-sponsored cyber espionage and disinforma

6 min readApr 4

Drift protocol governance compromised in sophisticated attack attributed to North Korea

A deep analysis of the Drift Protocol governance takeover, where attackers seized administrative control, putting $280M at risk in a sophisticated ope

6 min readApr 4

Anatomy of a cyber war: Dissecting Russia's digital assault on Ukraine

A deep dive into the cyber dimension of the Russia-Ukraine war, from the NotPetya wiper to the Viasat satellite hack and its global implications.

6 min readApr 4

Anatomy of a 10-second heist: Deconstructing North Korea's playbook for DeFi attacks

A viral headline claimed North Korean hackers stole $285M from Drift Protocol in 10 seconds. We deconstruct the real story: a sophisticated attack pla

7 min readApr 4