Image OSINT Put to the Test of AI: Exploring, Measuring, Verifying
Digital transformation
OSINT Put to the Test of AI: Exploring, Measuring, Verifying
Read
06
MIN
Image INCYBER Defence Interview with Col. René Innos – Estonian Cyber Command
Cyber stability
01.06.26 Cyber stability
INCYBER Defence Interview with Col. René Innos – Estonian Cyber Command
Read
11
MIN
Image Cybersecurity: are the United States really on the brink of collapse?
Cyber stability
01.05.26 Cyber stability
Cybersecurity: are the United States really on the brink of collapse?
Read
04
MIN
Image United States: two cybersecurity experts plead guilty to ransomware attacks
Cybercrime
01.03.26 Cybercrime
United States: two cybersecurity experts plead guilty to ransomware attacks
Read
01
MIN
Image Baltic Sea: Finland seizes vessel after damage to subsea cable
Cyber stability
01.02.26 Cyber stability
Baltic Sea: Finland seizes vessel after damage to subsea cable
Read
01
MIN
Image China moves to regulate anthropomorphic robots
Cyber stability
12.31.25 Cyber stability
China moves to regulate anthropomorphic robots
Read
01
MIN
Image Free flow of data between the EU and the United Kingdom extended until 2031
Cyber stability
12.31.25 Cyber stability
Free flow of data between the EU and the United Kingdom extended until 2031
Read
01
MIN
Image Georgia: former intelligence chief arrested for protecting online fraud networks
Cybercrime
12.29.25 Cybercrime
Georgia: former intelligence chief arrested for protecting online fraud networks
Read
01
MIN
Image Data Breach: the Great Hemorrhage
Cybercrime
12.15.25 Cybercrime
Data Breach: the Great Hemorrhage
Read
07
MIN
Image United States: the military rolls out GenAI.mil, an AI platform
Digital transformation
United States: the military rolls out GenAI.mil, an AI platform
Read
01
MIN
Image United States: $2.1 Billion Paid to Ransomware Gangs Between 2022 and 2024
Cybercrime
12.11.25 Cybercrime
United States: $2.1 Billion Paid to Ransomware Gangs Between 2022 and 2024
Read
01
MIN
Image The BISO: an operational bridge between cybersecurity and business lines
Cyber +
12.11.25 Cyber +
The BISO: an operational bridge between cybersecurity and business lines
Read
04
MIN
Image EU: ageing IT systems in critical infrastructure make them vulnerable to Russian sabotage
Industry and OT
12.10.25 Industry and OT
EU: ageing IT systems in critical infrastructure make them vulnerable to Russian sabotage
Read
01
MIN
Image Cybercriminals linked to China have targeted government entities with the BRICKSTORM malware
Cybercrime
12.10.25 Cybercrime
Cybercriminals linked to China have targeted government entities with the BRICKSTORM malware
Read
01
MIN
Image DSA: Brussels hits X with a record €120 million fine
Cyber +
12.08.25 Cyber +
DSA: Brussels hits X with a record €120 million fine
Read
01
MIN
Image [The Roads of Surveillance]: Investigation into the Global Market for Spyware / [Episode 0]
Cyber +
12.08.25 Cyber +
The Roads of Surveillance: Investigation into the Global Market for Spyware / Episode 0
Read
14
MIN
Image South Korea: Data breach exposes 33.7 million Coupang accounts
Cybercrime
12.06.25 Cybercrime
South Korea: Data breach exposes 33.7 million Coupang accounts
Read
02
MIN
Image Cloudflare warns of record DDoS attack carried out by the Aisuru botnet
Cybercrime
12.05.25 Cybercrime
Cloudflare warns of record DDoS attack carried out by the Aisuru botnet
Read
01
MIN
Image Predator spyware detected in several countries, including Iraq, Pakistan and Saudi Arabia
Cyber stability
12.05.25 Cyber stability
Predator spyware detected in several countries, including Iraq, Pakistan and Saudi Arabia
Read
01
MIN
Image Iran: between isolation and technological resilience
Digital transformation
Iran: between isolation and technological resilience
Read
04
MIN
Image Israel–Palestine War: the space sector targeted by hacktivists
Risks management
12.01.25 Risks management
Israel–Palestine War: the space sector targeted by hacktivists
Read
02
MIN