-
Initial Access Broker Market Q2 Summary
Overview of the Initial Access Broker Market Q2 Initial Access Brokers (IABs) are a key part of…
-
Weekly Cyber Threat Intelligence Summary
Welcome to this week’s Cyber Threat Intelligence Summary, where we bring you the latest updates and insights…
-
The Hacktivist Response to UK Foreign Policy
Introduction Hacktivism is by its very nature reactive, as it involves the use of computer-based techniques as…
-
Durov arrest and the CYJAX monitoring capability
In today’s increasingly digital world, cybercrime and online criminal activities pose significant threats to individuals, businesses, and…
-
The wider impact of the CrowdStrike outage
Introduction On Friday 19 July 2024, CrowdStrike suffered a serious outage in which over 8.5 million computers were…
-
Data-leak site emergence continues to increaseÂ
Introduction As the threat landscape continues to develop, ransomware and data brokerage groups constantly emerge, develop, and…
-
CVE discovery, PoC Development, IAB Listings, to Ransomware Attacks: How Cybercriminal Forums Facilitate the Lifecycle
By Olivia Betts and Adam Price In July 2024, CloudFlare identified that it can take cybercriminals as little as…
-
UK Election – The Hacktivism PerspectiveÂ
By Jake Keast Introduction The UK General Election marks a monumental time in UK politics. There has…
-
The Cybersecurity and Geopolitical Discussion — Vote UK — Episode 23
Geopolitical, cyber and security implications of the upcoming British election To find out, check out Episode 23…
Receive our latest cyber intelligence insights delivered directly to your inbox
Simply complete the form to subscribe to our newsletter, ensuring you stay informed about the latest cyber intelligence insights and news.