The best picks of the industry and team updates

An exclusive series authored by ZENDATA’s experts, featuring technical deep dives, the latest threat trends, articles on penetration testing, operational technology (OT), incident response (IR), managed detection and response (MDR), and more.

Swiss fake base station fraud - 2G downgrade attack Switzerland

Fake Mobile Network in Switzerland : Hackers are Coming loser to us

Cyber Crisis Pulse webinar International SOS - Steven Meyer - Gautier Porot

Webinar : Navigating Cyber Crises and AI Misinformation

webcam sextortion virus - Stealerium infostealer

From Fake Sextortion Emails to Real Sextortion Malware: The Rise of Stealerium

LLMs in the SOC: Value, Risks, and the Hidden Threat of Adversarial Injections

Un gigantesque logo de ransomware (comme un cadenas ou un crâne) se brisant en dizaines d’éclats plus petits, chacun se transformant en une icône de mini-gang de ransomware.

The ransomware ecosystem is evolving but not in ways defenders would hope

Hackers Knock Out Iranian Ship Communications | ZENDATA

Hackers Knock Out Iranian Ship Communications in Major Cyberattack

Charon Ransomware Targets Middle East | APT | ZENDATA

Charon Ransomware Targets Middle East Public Sector and Aviation

BreachForums Seized by Law Enforcement | ZENDATA Update

BreachForums Seized by Law Enforcement

Marks&Spencer Recovers After Cyber Incident | ZENDATA

Marks&Spencer Recovers After Cyber Incident

ZENDATA is looking for partnerships to join forces and provide your and our clients with the best solutions available on the market. If you want to become a partner, let's meet up!