From QR code deception to callback phishing and more: An overview of emerging email threats and attack trends
The Voice of Cyber®
Threat Intelligence
Threat Intelligence is a cornerstone of effective cybersecurity involving the collection, analysis, and dissemination of information about potential cyber threats to inform decision-making and enhance an organisation’s security posture. Threat intelligence encompasses data on emerging vulnerabilities, attack techniques, and the tactics employed by threat actors.
Newest Release
No results found.
Deep Dive Articles
Sort By
- Date
- Title

Organisations must detect, investigate, and respond to threats faster than ever. Success depends on measuring the right threat intelligence metrics which are those that can ...

Ransomware has entered a new phase in 2025—faster, more unpredictable, and increasingly targeting APAC. Reactive security no longer works and organisations must adopt ...

Fintech gift card system flaw may have allowed quiet cashouts. Signs point to possible exploitation months before it was discovered.
Turning Camera Surveillance on its Axis

Introduction
Emerging technologies like industrial Internet of Things, unified platform architectures, and cloud-integrated operational technology are transforming the ...

Introduction
On July 2, 2025, Qantas, Australia's flagship airline, disclosed a cyberattack that compromised the personal information of up to six million customers, first ...
No results found.
In The News
Sort By
- Date
- Title
Comprehensive AI Security Index and Agentic Resistance Score metrics help organisations stress-test security performance of AI systems, from pilot to production
At VAST Forward 2026, VAST Data, the AI Operating System company, and CrowdStrike (NASDAQ: CRWD) announced a strategic partnership that combines VAST’s native data-layer ...
New research from Infoblox Threat Intel shows how criminals twist a core part of the internet to slip past many of today’s standard security checks.
Phishing attacks are ...
AI-enabled attacks surge 89% as breakout time falls to 29 minutes; AI tools and development platforms are actively exploited
Sophos has released the 2026 Sophos Active Adversary Report, which reveals that 67% of all incidents investigated by Sophos Incident Response (IR) and Managed Detection and ...
“The Armis Developer Portal provides more than just documentation; we are giving the developer and security community direct access to the world’s most robust asset ...
No results found.
Podcasts On Threat Intelligence




