Hacktivism today: What three years of research reveal about its transformation

Overview When we published our findings on Hacktivism: Victims and Impact in 2023 in our Security Navigator 2024, hacktivism was already undergoing a visible resurgence. At the time, most of the incidents we observed were not technically destructive at scale in the conventional sense. What stood out were the broader structural trends emerging across the threat landscape. Hacktivism was becoming more frequent, more coordinated, and increasingly entangled with real-world […]

Hacktivism today: What three years of research reveal about its transformation Read More »

The factory floor under fire: why Operational Technology (OT) is the ultimate target for hackers

The days of the traditional air gap are officially over. We used to think of Operational Technology as completely separate from our everyday office computers, consisting mostly of the specialized systems that control pumps and robotic arms. But today, everything is connected. While this digital shift has brought amazing efficiency to the industry, it has

The factory floor under fire: why Operational Technology (OT) is the ultimate target for hackers Read More »

The invisible kill switch: Why operational technology (OT) is the new ground zero for cyber extortion

For decades, the factory floor was a fortress of physical isolation. Today, that traditional “air gap” has been replaced by a sprawling digital web. As organizations race to embrace the efficiency and automation of modern industry, they are bridging the gap between Operational Technology (OT) and traditional Information Technology (IT). While this convergence has unlocked

The invisible kill switch: Why operational technology (OT) is the new ground zero for cyber extortion Read More »

From production chaos to industrial calm: turning NIS2 into your safety shield

In the manufacturing sector, the stakes have never been higher. Recent data shows that manufacturing is now the number one victim of cyber extortion globally, with 1,228 recorded incidents in a single year. That is a 32,2%increase over the previous year. NIS2 arrives at a time when industrial environments are under immense pressure, and it

From production chaos to industrial calm: turning NIS2 into your safety shield Read More »

Smoking out an affiliate: SmokedHam, Qilin, a few Google ads and some bossware

TL;DR Explore the full CERT report Introduction Between early February and early April 2026, Orange Cyberdefense CERT was involved in separate malvertising incidents affecting three European clients. All three infection chains observed by our analysts revealed the use of the SmokedHam backdoor, delivered through malvertising and masquerading as common utility installers for RVTools or Remote Desktop Manager (RDM).  In one particular

Smoking out an affiliate: SmokedHam, Qilin, a few Google ads and some bossware Read More »

Continuous Threat Exposure Management (CTEM) – What Is It and Why Do You Need It?

Today’s organizations face a major challenge of identifying and understanding external attack surfaces. Hybrid cloud environments, work-from-anywhere capabilities, GenAI usage and a growing number of public-facing assets lead to uncertainty around data and IP protection. In addition, the average organization employs around 45 security tools, increasing the complexity of identifying misconfigurations and prioritizing critical vulnerabilities.

Continuous Threat Exposure Management (CTEM) – What Is It and Why Do You Need It? Read More »

Cloud-Native DSPM at Cloud Speed

Data security posture management (DSPM) has quickly moved from a nice-to-have to a baseline requirement. But the space is getting crowded. Many tools deliver visibility without meaningful risk reduction. Not all are truly cloud-native, and speed of deployment has become a deciding factor. To keep pace with today’s fast-moving data environments, DSPM must be cloud-native,

Cloud-Native DSPM at Cloud Speed Read More »

NHI 101: What Is a Non-Human Identity?

When we talk about identity, we still tend to picture people: employees, contractors, partners logging in from laptops. But in most modern organizations, the fastest‑growing identity population isn’t human at all. It’s machines, workloads, applications and automation. These are known as non-human identities (NHIs), and they now outnumber human users in many organizations anywhere from

NHI 101: What Is a Non-Human Identity? Read More »

Unlocking Identity: How to Scale IAM for Modern Complexity

Identity has become the control point of modern security – and the biggest source of enterprise risk. Organizations have invested heavily in IAM platforms, IGA tools, PAM solutions, SSO, MFA and Zero Trust. Yet despite years of spend and effort, many identity initiatives still stall or fail to produce meaningful, measurable outcomes. Why? Most identity

Unlocking Identity: How to Scale IAM for Modern Complexity Read More »

Data Privacy: Preventing Accidental and Malicious Data Leaks

Data is one of the most valuable and vulnerable assets in today’s digital world. From accidental file exposures to insider threats and ransomware, leaks are growing in scale and sophistication. Prevention requires an initiative-taking strategy that leverages technology, effective governance and robust security practices. This year’s Data Privacy Week theme, “Take Control of Your Data,” reminds us to

Data Privacy: Preventing Accidental and Malicious Data Leaks Read More »