If you wanted to learn how an organized cybercriminal operation worked, look no further than the threat group known as Conti. The recent leaks of the group’s chat logs have uncovered an unprecedented wealth of information and insights into how these veteran cybercriminals organize themselves. Cyber Threat Intelligence (CTI) vendors and independent researchers have spent weeks […]
Category Archives: Uncategorized
The title of this blog pays tribute to the film Tinker Tailor Soldier Spy, drawing a parallel between video games, cheating, and the world of hacking and espionage. It highlights the fact that the world of gaming and cybersecurity are deeply connected. A popular narrative in the cybersecurity industry is that many professionals were first […]
On 3 February 2022, the The UK Office of Gas and Electricity Markets (Ofgem) issued a warning that there has been a “record increase in global gas prices” which saw an “energy price cap rise of 54%”; adding that “Ofgem knows this rise will be extremely worrying for many people”. That last sentence is precisely why phishing […]
Background In 2015 and 2016, the Democratic National Committee (DNC) was hacked by not one, but two Russian intelligence services, the Russian Main Intelligence Directorate (GRU) and the Russian Foreign Intelligence Service (SVR). The two advanced persistent threat (APT) groups attributed to these organizations coexisted inside the DNC’s networks for months and provided valuable political intelligence to […]
Background Destructive cyberattacks and digital espionage campaigns targeting international space programs is a growing and concerning trend. Some of the most significant cyberattacks over the last five years have been turning points in the state of cybersecurity of international space programs and organizations with satellite infrastructure in space. Space exploration and the significance of having satellite […]