Skip to content

Cyber Threat Intelligence

change healthcare attack
  • William Altman

The Change Healthcare Attack: Quantifying Footprint for Cyber (Re)insurers

The Change Healthcare attacked affected many entities in the US. CyberCube used data to provide an exposure footprint estimate of companies affected.
Read Article
cyber insurance predictions 2024
  • Yvette Essen

Cyber Insurance Predictions 2024

The cyber insurance market is maturing, so (re)insurers need to be prepared for what's to come in 2024. This blog summarises some of the predictions from our cyber experts.
Read Article
meta pixel
  • William Altman

Meta Pixel: What Cyber (Re)insurers Should Know

Organizations using Meta Pixel have the potential to violate data privacy regulations. CyberCube can help customers identify companies that are using Meta Pixel.
Read Article
Five years of wannacry
  • Michael Sokolov

Five years of WannaCry: what has changed in ransomware since 2017?

Ransomware has evolved since the WannaCry ransomware attack in 2017, from changes in how complex ransomware is, to how attacks have become more targeted.
Read Article
What (re)insurers need to know about destructive wiperware
  • Michael Sokolov

What (re)insurers need to know about destructive wiperware

Wiper malware is on the rise. (Re)insurers must pay attention to this malicious software, as the destructive attacks have created chaos in the past.
Read Article
  • Darren Thomson

Top cyber security trends for 2022: what (re)insurers need to know

In this blog, we’ll cover cyber security trends occurring in 2022 so you are better positioned to judge the security of clients and future prospects, and make better cyber risk strategy decisions. 
Read Article
  • Pascal Millaire

Ransomware losses are not undermining the sustainability of cyber insurance

Ransomware losses are not undermining the sustainability of cyber insurance
Read Article
kaseya-ransomware-attack
  • Darren Thomson

The Kaseya ransomware “double-embedded” outbreak: what does it mean for (re)insurers?

Understand why the Kaseya attack represents a novel attack distribution method to spread malicious code has now proven to be a successful strategy.
Read Article
ransomware payments illegal
  • William Altman

Should ransomware payments be illegal? - Considerations for (re)insurers

Ransomware is increasingly top of mind for (re)insurers. Understanding both sides of the ransomware payments debate has never been more important.
Read Article
Cyber threat trends for your insurance business
  • Darren Thomson

Cyber threat trends for your insurance business

A look at the cyber threat landscape for insurance businesses. This blog outlines those trends to help insurers understand what’s to come in the future.
Read Article
  • William Altman

Fastly outage underscores global Internet fragility and the potential for catastrophic cyber losses

Fastly outage underscores global Internet fragility and the potential for catastrophic cyber losses
Read Article
  • Charlotte Anderson

SolarWinds and Constant Contact: “Sister” Supply Chain Attacks

SolarWinds actors’ repeat supply chain attacks show different courses to similar objectives
Read Article
colonial-pipeline-cyber-attack
  • William Altman

Cyber catastrophe meets enterprise ransomware: Colonial Pipeline attack

Cyber criminal gangs are targeting single-point-of-failure technologies and CyberCube can help (re)insurers both identify key SPoF-related cyber risks and model threats to SPoF technologies and companies.
Read Article
Advances in social engineering technology
  • Darren Thomson

Advances in social engineering technology (and why we should care)

Social engineering is not new but recent developments in this area leverage AI to make techniques all the more powerful and dangerous.
Read Article
Analysis footprint of recent Chrome and Windows zero-days discovery
  • Alejandro Sauter

Analyzing the footprint of recent Chrome and Windows zero-days discovery

Palo Alto Networks said “80% of exploits publish faster than CVEs” in August. We are facing this with two new zero-days being exploited in the wild in the most popular browser and OS in the world. Here we will explore the proportion of impacted networks and if any of them are quick to react (i.e. patch).
Read Article
featured-image-cloud
  • Darren Thomson

Another Cloud Outage – Are We Headed For “The Big One”?

AWS customers experienced another service outage last week as an apparently non-malicious incident took services down for around 8 hours.
Read Article
enterprise ransomware
  • Darren Thomson

Enterprise Ransomware: To Pay or Not to Pay… Is that even the question?

Paying ransoms to cybercriminals may not continue to be an option to legitimate businesses as the US government warns of penalties for organizations who fund criminal gangs
Read Article
Data-breach-image
  • Wenfeng Yan

More Cloudy, Less Chance of Data Breach?

CyberCube's cyber data correlation analysis shows that more cloud adoptions are not automatically guaranteed less data breach incidents.
Read Article
automation-image
  • Darren Thomson

Automation in cyber crime – A key enabler of future risk accumulation?

Automation and associated technologies could lead to more frequent risk accumulation events.
Read Article
Attack Vector Deep Dive mobile
  • Charlotte Anderson

Attack Vector Deep Dive: Mobile Attacks

The main types of cyber attacks on mobile devices
Read Article
CyberTrends Extracting Insights from news articles
  • Mohammad Al Boni

CyberTrends: Extracting Insights from news articles

Machine Learning, Text Analysis, Cyber News, Correlation Analysis, Topic Modeling, Document Embeddings
Read Article
attack vector deep dive
  • Charlotte Anderson

Attack Vector Deep Dive: Exposed Databases

This blog discusses the main types of attacks that occur on exposed databases, and important security steps toward protecting enterprises from this risk.
Read Article
Ransomware and the “Double-Dipping” Trend
  • Darren Thomson

Ransomware and the “Double-Dipping” Trend

A recent trend in enterprise ransomware sees criminals making not one, but two financial demands
Read Article