Skip to content

Cyber Threat Intelligence

ransomware payments illegal
  • William Altman

Should ransomware payments be illegal? - Considerations for (re)insurers

Ransomware is increasingly top of mind for (re)insurers. Understanding both sides of the ransomware payments debate has never been more important.
Read Article
Cyber threat trends for your insurance business
  • Darren Thomson

Cyber threat trends for your insurance business

A look at the cyber threat landscape for insurance businesses. This blog outlines those trends to help insurers understand what’s to come in the future.
Read Article
  • William Altman

Fastly outage underscores global Internet fragility and the potential for catastrophic cyber losses

Fastly outage underscores global Internet fragility and the potential for catastrophic cyber losses
Read Article
  • Charlotte Anderson

SolarWinds and Constant Contact: “Sister” Supply Chain Attacks

SolarWinds actors’ repeat supply chain attacks show different courses to similar objectives
Read Article
colonial-pipeline-cyber-attack
  • William Altman

Cyber catastrophe meets enterprise ransomware: Colonial Pipeline attack

Cyber criminal gangs are targeting single-point-of-failure technologies and CyberCube can help (re)insurers both identify key SPoF-related cyber risks and model threats to SPoF technologies and companies.
Read Article
Three cyber insurance takeaways from the OVHCloud fire
  • William Altman

Three cyber insurance takeaways from the OVHCloud fire

The OVHCloud data center fire highlights important lessons for cyber insurers
Read Article
Advances in social engineering technology
  • Darren Thomson

Advances in social engineering technology (and why we should care)

Social engineering is not new but recent developments in this area leverage AI to make techniques all the more powerful and dangerous.
Read Article
Analysis footprint of recent Chrome and Windows zero-days discovery
  • Alejandro Sauter

Analyzing the footprint of recent Chrome and Windows zero-days discovery

Palo Alto Networks said “80% of exploits publish faster than CVEs” in August. We are facing this with two new zero-days being exploited in the wild in the most popular browser and OS in the world. Here we will explore the proportion of impacted networks and if any of them are quick to react (i.e. patch).
Read Article
featured-image-cloud
  • Darren Thomson

Another Cloud Outage – Are We Headed For “The Big One”?

AWS customers experienced another service outage last week as an apparently non-malicious incident took services down for around 8 hours.
Read Article
enterprise ransomware
  • Darren Thomson

Enterprise Ransomware: To Pay or Not to Pay… Is that even the question?

Paying ransoms to cybercriminals may not continue to be an option to legitimate businesses as the US government warns of penalties for organizations who fund criminal gangs
Read Article
Data-breach-image
  • Wenfeng Yan

More Cloudy, Less Chance of Data Breach?

CyberCube's cyber data correlation analysis shows that more cloud adoptions are not automatically guaranteed less data breach incidents.
Read Article
automation-image
  • Darren Thomson

Automation in cyber crime – A key enabler of future risk accumulation?

Automation and associated technologies could lead to more frequent risk accumulation events.
Read Article
1 2 3 4