Lara De Jong
-

Phishing Campaign Targets Travel Websites
A Russian-speaking threat group launched a sophisticated phishing campaign, creating over 4,300 fake travel websites to steal payment information from hotel guests.
-

Autonomous Air Systems Explained
Autonomous Air Systems (AAS) advance aerial technology, moving beyond traditional remote-controlled drones to platforms that operate independently. These systems integrate advanced artificial intelligence, machine learning, and sophisticated sensor arrays to perform complex missions with minimal human intervention.
-

Understanding Package Registry Flooding
Package registry flooding is a cyberattack where threat actors overwhelm software package repositories with fake entries to hide malicious content, erode trust, and create vulnerabilities in the software supply chain. This article details its operation, impact, and mitigation strategies.
-

FPV Drones in Modern Warfare
Explore the critical role of First-Person View (FPV) drones in modern warfare, their tactical superiority, and their impact on cyber and electronic warfare, including training and counter-drone measures.
-

What is Phishing-as-a-Service (PhaaS)?
Phishing-as-a-Service (PhaaS) evolves the cybercrime landscape, mirroring legitimate Software-as-a-Service (SaaS) models. PhaaS offers accessible tools and infrastructure, letting even novices launch sophisticated phishing attacks to steal data and money.
-

SOCOM Launches Elite FPV Drone Training Program
The U.S. Special Operations Command (SOCOM) is launching a specialized training program to equip its elite forces with expertise in building and operating first-person-view (FPV) drones.
-

Kremlin Confirms Failed Backchannel Contact with UK Security Adviser
The Kremlin confirmed a brief, unsuccessful backchannel attempt by the UK involving Yury Ushakov and Jonathan Powell, aimed at establishing confidential communication amid European concerns over US disengagement in the Ukraine conflict.
-

Active Directory Under Siege: Why Critical Infrastructure Remains a Prime Target
Active Directory, the foundational identity and access management service for over 90% of Fortune 1000 companies, remains a critical target for cyber adversaries, especially in essential sectors like critical infrastructure. This article discusses its vulnerabilities, common attack techniques like Golden Ticket and DCSync attacks, and the severe implications of breaches, as illustrated by the 2024…
-

US Air Force Initiates Counter-Air Missile Program (CAMP)
The U.S. Air Force has launched the Counter-Air Missile Program (CAMP) to develop rapidly producible and cost-effective anti-air munitions. This initiative aims to acquire thousands of new missiles at approximately $500,000 per unit, emphasizing modularity, open systems, and digital-first development to accelerate deployment and lower expenses. The program’s initial phase focuses on a ground-launched prototype…
-

U.S. Army Selects Anduril’s AI Platform for Advanced Counter-Drone Capabilities
The U.S. Army has chosen Anduril Industries’ AI-powered Lattice software to enhance its counter-drone capabilities within the Integrated Battle Command System Maneuver (IBCS-M) program, providing advanced tools to combat evolving drone threats.
