Hacktivism is evolving – and that could be bad news for organisations everywhere

Hacktivism is nothing new, but the increasingly fuzzy lines between traditional hacktivism and state-backed operations make it a more potent threat. Hacktivism surged back into mainstream consciousness with the conflict in Ukraine in February 2022. Less than two years later, politically-motivated groups and individuals were out in force again, this time ostensibly to make their point amid … More Hacktivism is evolving – and that could be bad news for organisations everywhere

Locked Shields 2024: Ancient inspiration deployed for today’s complex digital battlegrounds

Is it strange that cybersecurity companies would be called to share their expertise in a military simulation of today’s digital battlespace? The answer seems to be a resounding no. However, despite being civilian organisations that don’t drill cyber-military scenarios, full-stack cybersecurity companies consider every day to be the real thing, with malware researchers, threat monitoring … More Locked Shields 2024: Ancient inspiration deployed for today’s complex digital battlegrounds

Preventative defense tactics in the real world

Don’t get hacked in the first place – it’s much less expensive than dealing with the aftermath of a successful attack. We watch real life attacks in horror, where companies simply try to defend against attackers stomping on their networks in real time, blunting the damage and scouring for backups in a bid to avoid … More Preventative defense tactics in the real world

ESET Research: Arid Viper group targets Middle East, poisons Palestinian app with spyware

ESET researchers have identified five campaigns that employ trojanised apps to target Android users. Most likely carried out by the Arid Viper APT group, these campaigns started in 2022, and three of them are still ongoing at the time of publication of this press release. They deploy multistage Android spyware, which ESET has named AridSpy, … More ESET Research: Arid Viper group targets Middle East, poisons Palestinian app with spyware

Valuable targets attract advanced threat actors. How to defend against quiet and persistent attacks

C-level executives, diplomats, and high-ranking IT managers usually have access to sensitive information, huge amounts of data, finances, or a combination of all these things. And adversaries know it. Anticipating all the precious data and access rights, cybercriminals and state-sponsored advanced persistent threat groups (APTs) are willing to invest a lot of time and money … More Valuable targets attract advanced threat actors. How to defend against quiet and persistent attacks