2025’s cyber threats call for a multilayered, proactive approach
One of the alarming trends is the incorrect use of IT resources by employees, or misuse, according to Orange Cyberdefense’s Security Navigator report.
Do we need a Dutch AI factory?
The Dutch government has engaged in talks with U.S. chip firms Nvidia and AMD about the development of an AI facility, it said in a statement last week which has been taken down since.
Facial ID farming: a threat for biometric security checks
According to researchers, cybercriminals have engineered a simple but sophisticated scheme to circumvent facial identity verification systems through coordinated data collection on the dark web.
HSMs: A critical component of an enterprise's cybersecurity strategy
The best way to safeguard cryptographic keys — and ultimately protect critical data — is with hardware security modules (HSMs) specifically designed to safeguard and manage them.
Touching the surface of Salt Typhoon’s telco attack
Earlier this month, it was found that Chinese hackers breached dozens of telcos worldwide. They specifically targeted at least eight US telecommunications and telecom infrastructure companies.
Is Hacktivism the next big threat?
Pro-Russian hacktivists have claimed over 6,600 attacks since March 2022, almost exclusively targeting Europe. This is the most important outcome of the latest Orange Cyberdefense Security research.
Planned cloud migration of government data halted due to security concerns
Digitalization State Secretary Zsolt Szabó has temporarily halted a planned cloud migration of data by governmental services and organizations, the Volkskrant reported on Monday.
Hacktivist alliances, backdoored AI, and supply chain attacks: predictions for the 2025 APT landscape
Russian cybersecurity company Kaspersky has outlined its predictions for the 2025 advanced persistent threat landscape.
Calls for Chrome sale lead to cybersecurity concerns
The U.S. Department of Justice has called for Alphabet’s Google to sell its Chrome browser. However, a forced sale brings questions about cybersecurity and user privacy.
A CISO’s guide to cybersecurity in action
Discover practical recommendations for top-tier technologies and tools to augment and elevate your security initiatives as a CISO. Unlock power and potential.


