Hacker Groups & Activities

Is Marbled Dust Escalating Cyber Espionage in the Middle East?

Hackers & Threats

Is Marbled Dust Escalating Cyber Espionage in the Middle East?

Amid growing digital transformations, the Middle East confronts complex cybersecurity challenges intricately tied to regional tensions and geopolitical ambitions. As businesses and governments expand their online presence, threat actors refine method

Analytics Intelligence Are SAP's Critical Patches Enough to Stop Active Exploits?

Malik Haidar, a renowned cybersecurity expert with a wealth of experience in tackling threats within multinational corporations, provides us with insights into the critical vulnerabilities addressed by SAP in May 2025. With his expertise in integrating business insights into cybersecurity

Are SAP's Critical Patches Enough to Stop Active Exploits?
Hackers & Threats How Did Billbug Target Critical Sectors in Southeast Asia?

In a shocking revelation, the Billbug group, linked to state entities, has unleashed a cyber-espionage campaign targeting Southeast Asia's critical sectors. From August 2024, operations extended to key industries, including government, telecommunication, and air traffic control, until these

How Did Billbug Target Critical Sectors in Southeast Asia?
Hackers & Threats Are Russian Hackers Exploiting Email Vulnerabilities Globally?

In recent years, Russian hackers have drawn increasing scrutiny for their suspected involvement in high-profile cyber espionage campaigns. Operation RoundPress stands as a particularly alarming example, suspected to originate from the cyber group Fancy Bear. This campaign is believed to target

Are Russian Hackers Exploiting Email Vulnerabilities Globally?
Hackers & Threats Coinbase Fights Back Against Cyber Extortion with Bold Strategy

Coinbase, the largest cryptocurrency exchange in America, recently faced a cyberattack in which insiders provided sensitive customer information to cybercriminals. In response to the May breach, instead of paying the demanded $20 million extortion, Coinbase offered the same amount as a reward for

Coinbase Fights Back Against Cyber Extortion with Bold Strategy
Hackers & Threats How Are Chinese Hackers Exploiting SAP Vulnerabilities?

In an alarming development, a cyber espionage campaign led by Chinese state-backed hackers, known as "Salt Typhoon," has come to the fore, exploiting a critical vulnerability in SAP NetWeaver Application Server Java 7.5 systems. This flaw, designated as CVE-2024-4584, has been rated at a

How Are Chinese Hackers Exploiting SAP Vulnerabilities?
Analytics Intelligence Is Microsoft Now a Private Cyber Intelligence Agency?

Introducing Malik Haidar, a cybersecurity authority whose insights are pivotal in understanding global threats and defense strategies. As technological landscapes shift, Malik brings clarity to the complex interplay between business and cybersecurity, making him an ideal expert to delve into the

Is Microsoft Now a Private Cyber Intelligence Agency?
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address