Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.
The MITRE Fight Fraud Framework (F3)™ is an authoritative, analyst-developed knowledge base of fraud actor behavior in cyber-based fraud incidents, gr…
Recent advancements in Artificial Intelligence (AI) technology introduce new cybersecurity 184 opportunities and challenges for organizations. Long ac…
The CAF - A tool for assessing cyber resilience
The Cyber Assessment Framework (CAF) provides a systematic and comprehensive approach to assessing the…
End-to-end guide on how to plan, run and evaluate an exercise
In today's digital landscape, organisations face increasing cyber threats. Cybersecurit…
The Domain Name System (DNS) is an integral part of any enterprise network architecture. An attack against the DNS infrastructure of an enterprise thr…
The Anatomy of a Confused Deputy Attack Chain
For purposes of this analysis, a confused deputy attack on an AI agent can be understood as a fourstage …
SIGS 10th Cloud Security Forum April 15th, 2026
Maxim Deweerdt, Cyber Defense Expert at NVISO Security and Principal Instructor at SANS
Chasing Ghos…
SIGS 10th Cloud Security Forum
April 15th, 2026
Doron Zimmermann, Senior Manager Enterprise Cyber & Information Security at Pragmatica
& Michael Ried…
SIGS 27th SOC Forum March 25th, 2026
This System Card describes Claude Mythos Preview, a large language model from Anthropic. Claude Mythos Preview is our most capable frontier model to d…
As artificial intelligence (AI) is integrated into commercial and government applications, there is growing demand to monitor these systems after epl…
Executive Summary
Cybersecurity in 2026 is accelerating amid growing threats, geopolitical fragmentation and a widening technological divide. Artifici…
This second edition of the INTERPOL Global Financial Fraud Threat Assessment examines how the fraud landscape has evolved over the past two years, hig…
Artificial intelligence (AI) is entering a decisive phase. Across industries and regions, organizations are moving beyond experimentation and demonstr…
This white paper explores the evolution of the CISO role in the face of rising complexity, outlining how this complexity manifests, what it demands of…