Blog

Dragon RaaS | Pro-Russian Hacktivist Group Aims to Build on “The Five Families” Cybercrime Reputation

Dragon RaaS is a ransomware group that walks the line between hacktivism and cybercrime. Also known as DragonRansom or Dragon Team, it emerged in July 2024 as an offshoot of the Stormous group, itself part of a larger cybercrime syndicate known as “The Five Families,” which includes ThreatSec, GhostSec, Blackforums, and SiegedSec. While Dragon RaaS […]

Dragon RaaS | Pro-Russian Hacktivist Group Aims to Build on “The Five Families” Cybercrime Reputation Read More »

Build Physical Security Superpowers with Smart Bullet Cameras and Multi-Imagers

How is your current physical security deployment doing? We consistently hear about cybersecurity threats looming in our increasingly digital spaces. Yet the breaches happening in our physical spaces—breaches that directly affect our people, places, and things—are just as prominent. In fact, 23% of chief security officers rate theft of company physical property as one of

Build Physical Security Superpowers with Smart Bullet Cameras and Multi-Imagers Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 11

The Good | Garantex Crypto Exchange Seized & Switzerland Launches New Cyberattack Reporting Rule While on vacation, things took a sharp turn for Aleksej Besciokov, the co-founder and a key administrator of the Russian crypto exchange Garantex. The Lithuanian national and Russian resident, also known online as “proforg” and “iram”, was apprehended under India’s extradition

The Good, the Bad and the Ugly in Cybersecurity – Week 11 Read More »

CyberLaw Forum 2025 | Navigating Security Risks & Actioning Resilience

This year’s Charleston CyberLaw Forum gathered top legal experts, cybersecurity professionals, and insurance leaders to tackle the complex challenges shaping the world today. Hosted in collaboration with the Charleston School of Law, the event featured thought-provoking discussions on the global threat landscape, responsible AI usage, supply chain vulnerabilities, and regulatory shifts that are impacting both

CyberLaw Forum 2025 | Navigating Security Risks & Actioning Resilience Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 10

The Good | DoJ Indicts Hackers Working for i-Soon & APT27 Since 2011, U.S. federal and state government agencies, as well as foreign ministries of several governments across Asia, have been the targets of attacks attributed to PRC-backed APT27 and i-Soon (aka Anxun Information Technology), a hacking contractor based in China. This week, the U.S.

The Good, the Bad and the Ugly in Cybersecurity – Week 10 Read More »

Cisco Meraki for Government Achieves FedRAMP® Moderate Authorization

Cisco Meraki is excited to announce that we have achieved FedRAMP® Moderate and StateRAMP® Moderate Authorization. Built on our reliable and scalable Cisco Meraki cloud networking platform, trusted by 75% of the Fortune 500, our Cisco Meraki for Government solution addresses the unique security and cloud-first needs of government agencies. Sponsored by the Cybersecurity and

Cisco Meraki for Government Achieves FedRAMP® Moderate Authorization Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 8

The Good | Chrome & Firefox Release Patches for Several High-Severity Vulnerabilities This week, Google and Mozilla released a new round of critical updates for Chrome 133 and Firefox 125, patching several high-severity memory safety vulnerabilities. These updates are available for Windows, macOS, and Linux, all addressing flaws that could allow attackers to execute arbitrary

The Good, the Bad and the Ugly in Cybersecurity – Week 8 Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 6

The Good | Police Charge Cybercriminals Behind Attacks on NATO & Major DeFi Protocols Following a trail of leaked data on various dark web forums, Spanish police have rounded out a year-long investigation on a suspect behind 40 cyberattacks on state institutions, universities, and private organizations. The suspect was arrested this week for allegedly targeting

The Good, the Bad and the Ugly in Cybersecurity – Week 6 Read More »

macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed

Last week Apple pushed a signature update to its on-device malware tool XProtect to block several variants of what it called the macOS Ferret family: FROSTYFERRET_UI, FRIENDLYFERRET_SECD, and MULTI_FROSTYFERRET_CMDCODES. This DPRK-attributed malware family was first described by researchers in December and further in early January and identified as part of the North Korean Contagious Interview

macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed Read More »