Cybersecurity

Sponsored
by

Cybersecurity / Recently Commented

Chinese APT Groups Exploit Global Domains in Sweeping Cyber Campaign

A years-long cyberespionage campaign by a Chinese state-sponsored group known as Salt Typhoon has revealed a striking escalation in both scale and technical sophistication. more

Advanced AI Is Reshaping the Cybercriminal Landscape at Alarming Speed

A new report has shed light on how advanced artificial intelligence is reshaping the cybercriminal landscape. The latest threat intelligence assessment by Anthropic details how its AI model, Claude, was misused in a string of global cyberattacks that mark a sharp escalation in both scale and sophistication. more

FTC to Big Tech: Don’t Trade American Privacy for Foreign Demands

In a striking admonition issued on August 21st, Andrew Ferguson, chairman of the Federal Trade Commission (FTC), cautioned over a dozen major technology firms against bowing to foreign demands that compromise American users' data security or freedom of speech. more

The Edgemoor Research Institute and TWNIC Launch Project Jake to Advance DNS Security and Data Transparency

The Edgemoor Research Institute (ERI) and Taiwan's .TW Registry (TWNIC) have announced a three-year strategic partnership to enhance Domain Name System (DNS) data management and internet security. The collaboration focuses on joint research, data sharing, and capacity building, aiming to strengthen global internet infrastructure and governance. more

INTERPOL Leads Arrest of 1,209 Suspects in Pan-African Cybercrime Crackdown, Recovers $97 Million

Authorities across 18 African nations, aided by the United Kingdom and INTERPOL, have arrested 1,209 suspects and dismantled over 11,000 illicit cyber infrastructures. more

The CEO Is Not Who They Seem: Deepfakes Target Corporate Trust

A surge in AI-generated deepfake scams is reshaping the cybersecurity threat landscape, with fraudsters now impersonating company executives to deceive employees and siphon off millions. more

Converging Technologies Create New Cyber Threats, UK Government Warns

As digital technologies intertwine ever more closely, new vulnerabilities are surfacing in unexpected places. A recent UK government report highlights how the convergence of emerging technologies - such as artificial intelligence (AI), blockchain, quantum computing, and the Internet of Things (IoT) - is generating complex cybersecurity risks across critical sectors. more

The Latest DNS Threat Landscape: Why CISOs Must Rethink Blocking Strategies

Cybercriminals live by the tenet "If it ain't broke, don't fix it." They'll use the same tactics repeatedly until they no longer work, then switch things up. That's why CISOs and their security teams maintain constant vigilance. Underscoring this, recent analysis of global DNS activity found that new domains continue to be a major tactic for bad actors. more

Disconnecting Finance: The EU’s Risky Use of Domain Takedowns as Regulatory Weapon

The European Union is increasingly wielding domain name deletions as a tool of financial enforcement - a trend sparked by the Markets in Crypto-Assets Regulation (MiCA) and now spreading across other legislative efforts such as the Financial Data Access Framework (FiDA) and the Payment Services Regulation (PSR).  more

ccTLD Registries Push Back Against EU’s Disinformation Crackdown

As the European Union presses ahead with its European Democracy Shield (EUDS) to counter foreign disinformation, European country code top-level domain (ccTLD) registries are urging caution. more

How New Domains are Driving DNS-based Attacks

Cyber criminals are the kings of recycling. Once they've found a tactic that works well, they'll keep doing it as long as they can get away with it. That's why it's so important for research teams to keep a close eye on what's happening behind the scenes with web traffic. Case in point? Our team at DNSFilter recently analyzed global DNS activity from the first quarter of 2025 and identified several notable trends. more

Massive Iberian Power Outage Raises Cybersecurity Questions

On April 28th, a widespread blackout plunged millions across Spain, Portugal, and parts of south-west France into darkness, disrupting homes, transit systems, and even sporting events like the Madrid Open. more

‘Notorious Hosting Providers’: An Overview of the Highest-Threat Hosts From IP-address Blacklist Analysis

One major element of many brand-protection programmes is the use of an algorithm to sort the findings identified through monitoring, according to their relevance or level of potential threat. This prioritisation process offers a number of benefits, including the identification of priority targets for further analysis, content tracking, or enforcement. more

Bad News From the 2025 Munich Security Conference: Cyberspace Gets Weaponized

There was one unpleasant message from the 2025 Munich Security Conference (MSC), which will have probably far reaching consequences for the governance of the digital space: Cyberspace will be governed by the rules of geo-political conflicts. And it is a battlefield in the 21st century wars. Both in the "Bayerischer Hof" and in the "IHK Munich", where the 11th edition of the Munich Cybersecurity Conference (MCSC) took place, controversial debates circled around the question of how civilian and military use of digital services will interplay in the years to come. more

Internet Governance Outlook 2025: Unbordered Spaces vs. Bordered Places

At the end of the 20th century, Manuel Castells gave an outlook into the "Network Society" of the 21st century. One of his forecasts was that the world would move from "bordered places" (sovereign nation-states) to "unbordered spaces" (global networks). A quarter of a century later, we see that he was right and wrong. We do now have "unbordered spaces." We can communicate around the globe anytime with anybody, regardless of frontiers. But the "bordered places" did not disappear. More and more states are insisting on their "digital sovereignty." more