Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Rising Tide of Card Fraud: Why US Consumers Are at Increasing Risk

Fraud is everywhere. From phishing emails to fake investment schemes, scams have become an unfortunate part of our digital lives. However, one type of fraud that strikes fear across the board, affecting both individuals and businesses, is card and payment fraud. Unlike other scams, this one hit directly where it hurts: your money.

A Pressing Matter Part I - The Simplification of Ransomware Crime Development Through Cybercriminal Forums

Five centuries after the printing press was invented, the digital age began. With significant revolutions in knowledge dissemination, the era taking place now has seen vast amounts of information become instantly accessible. Whilst this is generally seen as a positive in most countries worldwide, malicious intentions persist across the digital world.

Beyond The Breach: How Businesses Can Recover and Rebuild Trust

In the world of cybersecurity, this statement couldn’t be more relevant. Trust is the invisible thread that binds a company to its customers, partners, investors, and even its employees. It’s what gives users the confidence to share their personal data, stakeholders the faith to invest, and teams the motivation to innovate. But trust is fragile, especially in a digital age where one breach can unravel years of credibility in a matter of minutes.

Weaving Chaos - Scattered Spider's Cyberattacks Spin a Dangerous Web Across the Insurance Industry

In Q2 2025, Scattered Spider has been noted as a prolific threat actor targeting several sectors across multiple countries. As of June 2025, the group appears to have moved towards targeting the insurance sector. This is not novel victimology within the landscape, with attacks consistently targeting the sector, particularly in the extortion sphere. This blog explores the attacks Scattered Spider has conducted in 2025, as well as similar attacks around the insurance sector in the year.

How AI Is Redefining Fraud Detection

Card fraud is escalating at an alarming rate, with no signs of slowing down. In a world where digital payments have become the norm, almost everyone, consumers, businesses, and financial institutions, finds themselves at risk. The convenience of card payments has made them an essential part of daily life, but it has also paved the way for sophisticated fraud schemes. For businesses, the stakes are even higher.

Translating Threat Intelligence into Boardroom Value

In fast-paced threat intelligence environments, day-to day focus is often on monitoring risks, responding to incidents, and staying ahead of evolving threats. In the middle of this operational intensity, structured board reporting can easily be overlooked. But as threat landscapes grow more complex and cyber risks gain board-level attention, the absence of clear, strategic reporting becomes a liability. Board reporting isn’t just a good practice, its a regulatory imperative.

A Sting on Bing: Bumblebee delivered through Bing SEO poisoning campaign

Bumblebee is a downloader malware which has become known for its sophistication and effectiveness. The malware was first discovered in 2022 and was believed to be a tool for ransomware groups due to the developer’s close ties with Conti. Since then, it has been used in various attacks and has been delivered through multiple methods, including phishing emails, malicious documents, and SEO poisoning.

Phishing for Victims: The Cognitive Tricks Cybercriminals Use

Most of us have encountered suspicious emails or messages; a missed delivery notification, a security alert from a bank, or an unexpected prize win. Even when these messages raise red flags, it’s not uncommon for people to open them out of curiosity or concern. This is precisely what phishing relies on. Phishing refers to a type of cybercrime where attackers use fraudulent emails, text messages, or phone calls to deceive individuals.

Building a Proactive Threat Intelligence Program: Exclusive Guide For A CISO

As cyber threats grow more advanced and persistent, traditional reactive defences are no longer enough. Today’s security leaders must shift toward proactive threat intelligence, anticipating and neutralising risks before they evolve into serious breaches.

A Brief History of Threat Intelligence: How We Got Here

Although cyber threat intelligence has become increasingly important in the modern era, driven by the exponential rise in cybercrime and global dependence on digital infrastructure, the foundational concept of threat intelligence is not a recent development. In 2024, just over four in ten businesses (43%) and three in ten charities (30%) reported experiencing some form of cybersecurity breach or attack in the previous 12 months, highlighting the scale of today’s threat landscape.