Ukraine's shadow war: Zelenskyy claims Iranian drone shootdowns in the Middle East
President Zelenskyy's claim of downing Iranian drones in the Middle East signals Ukraine's shift from a defense recipient to a global security exporte
Beyond the headlines: How nation-states weaponize opinion in the digital age
Public opinion polls reflect a moment in time, but nation-states now use sophisticated cyber tactics to actively shape those views as a form of modern
When the pumps run dry: A 2013 IT meltdown was a warning for critical infrastructure
In 2013, a massive IT failure, not a cyberattack, crippled Ireland's largest fuel retailer. This analysis explores the technical breakdown and its les
Citizen Lab: How law enforcement used ad data to track millions of devices
A Citizen Lab report reveals how a surveillance tool called Webloc uses real-time bidding ad data to enable global location tracking by law enforcemen
UK exposes Russian submarine maneuvers near critical undersea cables
A detailed analysis of the UK's exposure of Russian submarine activity near critical undersea cables, exploring the technical threats and global impac
Iranian cyber campaign against US water systems is a wake-up call for OT security
US government warnings about Iran-linked hackers targeting water systems highlight a critical vulnerability: internet-exposed industrial control syste
Senator launches inquiry into 8 tech giants over child abuse material reporting failures
A U.S. Senator has launched an inquiry into Meta, Google, Apple, and others over alleged failures to report child abuse material, citing new AI risks.
Hims breach exposes the most sensitive kinds of PHI
Telehealth giant Hims & Hers exposed sensitive health data of nearly 400,000 users, creating a severe risk of targeted blackmail, fraud, and extortion
Dutch hospitals face disruptions after ransomware attack on software provider ChipSoft
A detailed analysis of the ransomware attack on Dutch healthcare software provider ChipSoft, its impact on hospitals, and steps to mitigate such threa
‘It reads like a spy novel’: North Korean operatives use fake companies in $280 million crypto theft campaign
A deep-dive into the sophisticated, multi-month social engineering campaign by North Korea that targeted Drift Protocol as part of a larger $280M cryp
UK puts tech execs on notice: Jail time looms for failing to stop AI 'nudification' tools
The UK's Online Safety Act now threatens tech executives with prison time if their platforms fail to combat the spread of AI-generated 'nudification'
Critical Marimo flaw exploited hours after public disclosure
A critical remote code execution flaw in Marimo was weaponized and exploited just nine hours after its disclosure, highlighting a shrinking defense wi











