By Shantanu Bhattacharya Posted on February 06, 2025 | Originally published on RSAC Conference đź“Ś Read the original article on RSAC Conference In the ever-evolving landscape of cybersecurity, attackers are constantly seeking new ways to bypass traditional defenses. This blog delves into the often-overlooked methods they use, focusing on how obscure techniques, specifically within UNIX […]
Cyberattacks
Iranian Cyberwarfare History and Capabilities

In the final episode of our deep-dive into Middle East cyber- and information warfare, we take a closer look at Iran.
Webinar: Space, Satellites and Cyber Threats – 9 September 2021

On September 9th 2021, CyAN hosted a webinar on how space infrastructure and satellites are vulnerable to cyberattack. CyAN International VP Peter Coroneos hosted the event and was joined by an extraordinary panel: Prof. Steven Freeland, international space law authority and Vice-Chair of a 5-year Working Group on the “exploration, exploitation and utilisation of space resources”; Edward […]