A New Frontline: When Geopolitical Tensions Spill into Cyberspace
Discover how cyber warfare played a key role in the Iran-Israel conflict and why businesses worldwide need to be ready […]
Discover how cyber warfare played a key role in the Iran-Israel conflict and why businesses worldwide need to be ready […]
Oracle has acknowledged a breach impacting over 6 million credentials on its legacy cloud systems. Xcitium unpacks the timeline, legal
Secure Boot is a critical defense layer designed to protect modern PCs and servers from malware by ensuring only trusted
Token theft occurs when attackers steal a valid cloud authentication token (for example an OAuth access or refresh token, or
Phishing scams are evolving fast. In fact, a recent report found that over 30 million phishing emails hit enterprise networks
Microsoft recently disclosed a massive Lumma Stealer (aka LummaC2) campaign infecting Windows machines worldwide. In a coordinated action with the DOJ, Europol,
The Conti ransomware gang recently leaked an internal “EDR Tier List” on their Twitter (X) account, ranking popular endpoint protection
In 2017 WikiLeaks published “Vault 7,” a huge cache of CIA documents describing its hacking tools and targets. Among thousands
In May 2025, one of the world’s leading sportswear companies, Adidas, revealed two significant customer data breaches in Korea and
In mid-May 2025, alarming reports circulated online claiming that 89 million Steam user accounts had been breached. A dark-web seller
At the beginning of May 2025, India launched Operation Sindoor, a precision-guided missile strike on so called terrorist training camps
British high-street retailer Marks & Spencer (M&S) was shaken over an Easter weekend-commencing cyberattack, which was confirmed on April 22,