Analytics

    Discover our in-depth analysis and expert insights into the latest cybersecurity trends, threats, and solutions. Stay ahead of the curve and keep your organization safe using the comprehensive and actionable information on this page provided by our experienced team of analysts and researchers. From data breaches to emerging technologies, we cover it all.

    Topics
    Date period
    Cyberthreats/Incidents

    Cyberattacks on Egypt's infrastructure in 2024

    By 2024, Egypt had established itself as one of the digital leaders in North Africa and the Middle East. However, the rapid expansion of the digital environment, the ever-growing number of internet users, and Egypt's geopolitical relationships have made it an attractive target for cybercriminals, hacktivists, and advanced persistent threat (APT) groups.

    Corporate infrastructure

    Standoff Bug Bounty in review (as of November, 2024)

    Standoff Bug Bounty is a platform where white hat hackers get rewards for discovering vulnerabilities, which helps companies enhance their IT infrastructure security. This study shows the platform operation results as of November 30, 2024. Read on to learn more about reports submitted by white hackers, rewards paid, and vulnerabilities detected. We'll discuss the unique and extraordinary programs that you can find on the platform, and show how bug bounty platforms can increase cyber resilience for companies.

    Cyberthreats/Incidents

    Trending vulnerability digest December 2024

    In December, we classified four vulnerabilities as trending. These represent the most dangerous security flaws, either currently being widely exploited by cybercriminals or likely to be exploited in the near future.

    Other, Finance/Banking, IoT

    Top five tech trends of 2024 and their impact on the 2025 cyberthreat landscape

    The rapid advancement of technologies like AI, blockchain, digital financial assets, the Internet of Things, cyber-physical systems, cloud infrastructures, and autonomous vehicles is a double-edged sword. While fueling business growth, these innovations also empower cybercriminals with an ever-expanding arsenal. As we move further into 2025, let's examine the evolving landscape of cyberattacks and explore the threats likely to dominate the rest of the year.

    ICS/SCADA, IoT

    Cyberthreats to industrial IoT in the manufacturing sector

    This study examines the evolution and security implications of IoT as a cyber-physical system integrating operational and IT infrastructures. We focus on how IIoT optimizes production, enables predictive maintenance, and provides real-time data monitoring. We also evaluate the manufacturing industry's vulnerability to cyberthreats amid increasing digitalization and explore the potential consequences of attacks on IIoT systems and devices.

    Cyberthreats/Incidents

    Cyberthreats evolve while forecasts signal more sophisticated risks ahead

    Over the past year, cyberthreats have become more volatile and harder to predict. Hackers are focusing on IT companies more than ever, often infiltrating their victims by exploiting third-party contractors. At the same time, new geopolitical pressures are fueling a surge in hacktivist activity, and the fallout is becoming more severe. Hackers are getting faster, smarter, and more efficient, taking advantage of cutting-edge tools and emerging technologies to amplify their impact.

    Cyberthreats/Incidents

    Trending vulnerability digest November 2024

    In November, we highlighted eight trending vulnerabilities. These represent the most dangerous security flaws, either currently being widely exploited by cybercriminals or likely to be exploited in the near future.

    Other

    Artificial intelligence in cyberattacks

    AI can be applied for a wide range of cybercriminal purposes. With generative AI systems, criminals can quickly gather information about their targets, create content for attacks (whether phishing emails, audio calls, or video deepfakes), generate malicious code, and search for vulnerabilities in targeted applications. Malicious tools that integrate AI technologies can be used to automate the analysis of large volumes of data in side-channel attacks and certain other attack stages.
    Cyberthreats/Incidents

    A look at India through the dark web: what hackers are after

    In this study, we explored the market of cybercriminal services in India—a country undergoing significant digital transformation and attracting the attention of cybercriminals. We analyzed 380 Telegram channels and dark web forums, with a total of 65 million users and 250 million messages.

    Finance/Banking, Cyberthreats/Incidents

    Cyberthreats in the financial industry: H2 2023 – H1 2024

    Financial organizations remain one of the most attractive targets for cybercriminals. In the first half of 2024, they ranked in the top five sectors by the number of recorded information security incidents. In this study, we will look at how malicious actors operate and what impact their actions have on financial organizations; what role darknet markets play; what events are considered non-tolerable for financial organizations, and how to prevent them.
    • ...

    Get in touch

    Fill in the form and our specialists will contact you shortly.

    General questions

    We're happy to answer any questions you may have.

    Partnership

    Join us in making the world a safer place.

    Request a pilot

    Test drive our solutions with a customized pilot program.

    Phone number
    Email
    Country