Image Data Breach: the Great Hemorrhage
Cybercrime
12.15.25 Cybercrime
Data Breach: the Great Hemorrhage
Read
07
MIN
Image United States: the military rolls out GenAI.mil, an AI platform
Digital transformation
United States: the military rolls out GenAI.mil, an AI platform
Read
01
MIN
Image United States: $2.1 Billion Paid to Ransomware Gangs Between 2022 and 2024
Cybercrime
12.11.25 Cybercrime
United States: $2.1 Billion Paid to Ransomware Gangs Between 2022 and 2024
Read
01
MIN
Image The BISO: an operational bridge between cybersecurity and business lines
Cyber +
12.11.25 Cyber +
The BISO: an operational bridge between cybersecurity and business lines
Read
04
MIN
Image EU: ageing IT systems in critical infrastructure make them vulnerable to Russian sabotage
Industry and OT
12.10.25 Industry and OT
EU: ageing IT systems in critical infrastructure make them vulnerable to Russian sabotage
Read
01
MIN
Image Cybercriminals linked to China have targeted government entities with the BRICKSTORM malware
Cybercrime
12.10.25 Cybercrime
Cybercriminals linked to China have targeted government entities with the BRICKSTORM malware
Read
01
MIN
Image DSA: Brussels hits X with a record €120 million fine
Cyber +
12.08.25 Cyber +
DSA: Brussels hits X with a record €120 million fine
Read
01
MIN
Image [The Roads of Surveillance]: Investigation into the Global Market for Spyware / [Episode 0]
Cyber +
12.08.25 Cyber +
The Roads of Surveillance: Investigation into the Global Market for Spyware / Episode 0
Read
14
MIN
Image South Korea: Data breach exposes 33.7 million Coupang accounts
Cybercrime
12.06.25 Cybercrime
South Korea: Data breach exposes 33.7 million Coupang accounts
Read
02
MIN
Image Cloudflare warns of record DDoS attack carried out by the Aisuru botnet
Cybercrime
12.05.25 Cybercrime
Cloudflare warns of record DDoS attack carried out by the Aisuru botnet
Read
01
MIN
Image Predator spyware detected in several countries, including Iraq, Pakistan and Saudi Arabia
Cyber stability
12.05.25 Cyber stability
Predator spyware detected in several countries, including Iraq, Pakistan and Saudi Arabia
Read
01
MIN
Image Iran: between isolation and technological resilience
Digital transformation
Iran: between isolation and technological resilience
Read
04
MIN
Image Israel–Palestine War: the space sector targeted by hacktivists
Risks management
12.01.25 Risks management
Israel–Palestine War: the space sector targeted by hacktivists
Read
02
MIN
Image Two months later, the cyberattack on Asahi continues to disrupt the group’s operations
Cybersecurity
12.01.25 Cybersecurity
Two months later, the cyberattack on Asahi continues to disrupt the group’s operations
Read
01
MIN
Image AI-Powered Browsers Create New Vulnerabilities
Risks management
12.01.25 Risks management
AI-Powered Browsers Create New Vulnerabilities
Read
07
MIN
Image SBOM: From Regulatory Constraint to Cornerstone of Software Security
Cybersecurity
11.27.25 Cybersecurity
SBOM: From Regulatory Constraint to Cornerstone of Software Security
Read
07
MIN
Image Kimsuky: Pyongyang’s Eye in Seoul’s Mailbox
Cybercrime
11.25.25 Cybercrime
Kimsuky: Pyongyang’s Eye in Seoul’s Mailbox
Read
06
MIN
Image Negationist Statements by Grok on X: LDH and SOS Racisme File a Complaint
Digital transformation
Negationist Statements by Grok on X: LDH and SOS Racisme File a Complaint
Read
02
MIN
Image Europe Finally Strengthens Its Tech Response
Digital Sovereignty
Europe Finally Strengthens Its Tech Response
Read
02
MIN
Image Éric Singer, CISO at Ingenico, a craftsman of digital trust
Cybersecurity
11.21.25 Cybersecurity
Éric Singer, CISO at Ingenico, a craftsman of digital trust
Read
04
MIN
Image Shani Benoualid, Ambassador of the Trust & Safety Forum: “Europe has regulation, but not yet the ecosystem”
Cyber +
11.18.25 Cyber +
Shani Benoualid, Ambassador of the Trust & Safety Forum: “Europe has regulation, but not yet the ecosystem”
Read
07
MIN