New report addresses growing threat of DDoS attacks against the financial sector.

New report addresses growing threat of DDoS attacks against the financial sector.

A new joint report by FS-ISAC and Akamai, titled From Nuisance to Strategic Threat: DDoS Attacks Against the Financial Sector, highlights a sharp escalation in both the frequency and sophistication of distributed denial-of-service (DDoS) attacks targeting the global financial sector. The findings underscore a strategic shift in cybercriminal tactics, with significant consequences for financial institutions, their customers, and the broader economy.
Oracle databases, TNS, and how to hack it.

Oracle databases, TNS, and how to hack it.

The Oracle Transparent Network Substrate (TNS) server is a communication protocol that enables communication between Oracle databases and applications across networks. Initially introduced as part of the Oracle Net Services software suite, TNS supports diverse networking protocols, including IPX/SPX and TCP/IP protocol stacks, facilitating communication between Oracle databases and client applications. Its built-in encryption mechanism ensures the security of data transmitted. Over time, TNS has undergone updates to support newer technologies, including IPv6 and SSL/TLS encryption.
DARPA issues call to private sector, urging partners to assist in strengthening DoD’s cybersecurity.

DARPA issues call to private sector, urging partners to assist in strengthening DoD’s cybersecurity.

Defense Advanced Research Projects Agency (DARPA) has issued a significant call to the private sector, urging industry partners to assist in improving and strengthening cybersecurity for the Department of Defense (DoD). This initiative is part of a broader strategy to address escalating cyber threats targeting U.S. military and critical infrastructure systems.
Qilin ransomware-as-a-service (RaaS) adds a “call an attorney” feature to pressure victims to pay.

Qilin ransomware-as-a-service (RaaS) adds a “call an attorney” feature to pressure victims to pay.

The threat actors behind the Qilin ransomware-as-a-service (RaaS) scheme have recently introduced a “Call Lawyer” feature, offering legal counsel to their affiliates as a means to increase pressure on victims during ransom negotiations. This development is part of a broader strategy to make Qilin stand out in the cybercrime marketplace by providing a full suite of services to affiliates, including legal assistance, negotiation support, data storage, DDoS capabilities, and even media support.
How to hijack a television broadcast signal.

How to hijack a television broadcast signal.

Broadcast signal hijacking—also known as broadcast signal intrusion—is the unauthorized takeover of television (or radio) signals, allowing attackers to inject their own content into a broadcast. Over the years, several methods have been used to achieve this, ranging from physical tampering to sophisticated cyberattacks.
Iran’s state-owned TV broadcaster hacked to air calls for street protests.

Iran’s state-owned TV broadcaster hacked to air calls for street protests.

On Wednesday night, June 18, 2025, Iran’s state-owned television broadcaster was hacked, interrupting regular programming to air videos calling for street protests against the Iranian government. The broadcast was briefly hijacked, with footage showing women cutting their hair and messages urging citizens to “rise up” and “take control of your future”. The disruption was widely shared on social media and quickly drew both domestic and international attention.
You’ve been dragged through hell and emerged bruised and battered. Now how do you conduct an effective post-incident review?

You’ve been dragged through hell and emerged bruised and battered. Now how do you conduct an effective post-incident review?

When an incident occurs—whether it’s a security breach, a system outage, or a critical business disruption—the immediate priority is resolution. But once the dust settles, the real opportunity lies in learning from the event to strengthen your organization’s resilience. Conducting an effective post-incident review (PIR) is essential for continuous improvement, risk mitigation, and fostering a culture of transparency and trust.