DANY FARES

DANY FARES

25
Nov
Exploiting the Oracle Gap: Unpacking the Cl0p Breach at The Washington Post

Exploiting the Oracle Gap: Unpacking the Cl0p Breach at The Washington Post

November 16, 2025 The cyberattack against The Washington Post marks a significant escalation in the ongoing wave of large-scale data
5 min read
24
Nov
APT42’s SpearSpecter Campaign: Inside Iran’s New Layered Cyber-Espionage Operation

APT42’s SpearSpecter Campaign: Inside Iran’s New Layered Cyber-Espionage Operation

November 18, 2025 The unfolding SpearSpecter campaign attributed to Iran’s APT42 marks a decisive evolution in state-sponsored cyber espionage.
4 min read
24
Nov
Iran’s Expanding Cyber Espionage Program: The SmudgedSerpent Campaign Against U.S. Think Tanks and Academics

Iran’s Expanding Cyber Espionage Program: The SmudgedSerpent Campaign Against U.S. Think Tanks and Academics

November 22, 2025 Iran’s cyber espionage apparatus has entered a new phase of strategic maturity, marked by increasingly sophisticated
5 min read
24
Nov
Australia’s Expanding Cyber Battlespace: Regional Pressures, Authoritarian Threats, and the Strategic Risks of AI Adoption

Australia’s Expanding Cyber Battlespace: Regional Pressures, Authoritarian Threats, and the Strategic Risks of AI Adoption

November 21, 2025 Australia is entering one of the most complex phases of its digital and geopolitical evolution. In a
5 min read
22
Nov
Akira’s Playbook: How Cybercrime Became a Macroeconomic Risk

Akira’s Playbook: How Cybercrime Became a Macroeconomic Risk

November 18, 2025 In the evolving landscape of cyber threats, ransomware has transcended its criminal origins to become a strategic
5 min read
20
Nov
Cyber Shockwave: The Jaguar Land Rover Attack and Its Economic Reverberations

Cyber Shockwave: The Jaguar Land Rover Attack and Its Economic Reverberations

November 20, 2025 The cyberattack on Jaguar Land Rover in September 2025 was not just a corporate crisis—it became
3 min read
19
Nov
North Korea’s KONNI Cluster Weaponizes Google’s Find My Device: A New Phase in DPRK Android Targeting

North Korea’s KONNI Cluster Weaponizes Google’s Find My Device: A New Phase in DPRK Android Targeting

November 18, 2025 North Korean operators from the KONNI activity cluster—affiliated with Kimsuky and APT37—have begun exploiting Google’
4 min read
19
Nov
Landfall Spyware – Anatomy of a Silent Android Espionage Campaign in the Middle East

Landfall Spyware – Anatomy of a Silent Android Espionage Campaign in the Middle East

November 18, 2025 In the expanding battlefield of mobile cybersecurity, the Landfall spyware campaign stands out as one of the
3 min read
19
Nov
Investment Scams Surge Across the US as Fraudsters Exploit Social Media, Texts, and Crypto Boom

Investment Scams Surge Across the US as Fraudsters Exploit Social Media, Texts, and Crypto Boom

November 18, 2025 Investment scams have surged across the United States, reporting over 66,700 incidents and $3.5 billion
2 min read
19
Nov
Hackers target electrical company in US and Canada

Hackers target electrical company in US and Canada

November 18, 2025 A notorious ransomware gang has targeted Spark Power, stealing 222GB of sensitive data. This attack raises serious
1 min read