Research / Anatomy of a Breach

FTX Hacker Finally Making a Move

After FTX's monumental crash and a hacker's theft of hundreds of millions, the crypto world searched for answers, and just when the trail seemed cold, unexpected activity sparked from the suspected hacker's wallet.

Read Story

The MOVEit Hack: What You Need to Know

The intricacy of the MOVEit hack is having a profound impact on many public and private organisations. But will these organisations learn the crucial cybersecurity lessons this moment will ultimately teach them?

Read Story

State-Sponsored Espionage and the Complexity of Mobile Security

State-Sponsored Espionage and the Complexity of Mobile Security

In a world progressively interwoven with technology, the ever-evolving landscape of mobile exploitation has become a focal point for cybersecurity and geopolitics alike. We dissect the multifaceted terrain of state-sponsored cyber-activity, revealing how the complexities of mobile sec …

Read Story

Insider Threats During Times of Conflicts

Insider Threats During Times of Conflicts

As organisations strive for diversity and inclusion across their employee groups, we must not lose sight of the fact that groups of employees are still individuals with their own beliefs, identities, and affiliations. As tensions continue to rise in the geopolitical world, cybersecuri …

Read Story

Ships, Update Cycles, and the Reliance on Guidance Systems

Multiple parties are looking into ways of disrupting GPS, and especially GPS-related systems. However, this attack is notable because it demonstrates how cyber attacks can leverage wireless communication systems that were not designed with security in mind. First Published 8th June 20 …

Read Story

Attacks Against Infrastructure & Mortal Consequences

The world is heading towards a dangerous crossroads in cyber security. A future in which, more and more, critical physical systems - whether machinery or utilities - have a direct impact on human life. First Published 1st March 2021 | Latest Refresh 15th January 2023 It seems hackers …

Read Story

The Fifth Third Bank Breach - Banks and Insider Threats

We’re starting to see a pattern emerge in the reporting that financial institutions use when they’re breached. Fifth Third Bank, one of the top 20 banks in the US, is yet another high-profile organisation to have suffered a major security incident. First Published 25th February 2020 | …

Read Story

Stop 3rd Party Security Vendor Backdoor Leaks Before They Bite

Several major networking equipment providers were found to have backdoors in their firmware that exposed private keys and even allowed remote code execution. If you’re not yet worried, then you’re not paying attention.

Read Story

The Black Market for Accounts

While black markets have existed since the early days of the internet, recent technological changes have made them a much more lucrative and popular option than before. The value of credentials for services like Disney+, Netflix and AWS will continue trending upward as long as there’s …

Read Story

InterContinental Hotels Group Card Data Hack

InterContinental Hotels Group Card Data Hack

If reports were correct, this was one of the hospitality industry's largest data breaches to date. With nearly 1,200 hotels affected, the breach was large enough to reach out and touch a significant portion of the 61 million IHG stays per year. First Published 20th April 2017 | Latest …

Read Story

Subscribe by email