Join us for our executive education programmes in collaboration with Cambridge Judge Business School

Register to attend
NotPetya

02.2022 . Spotlight

Re-cap: The Untold Story of NotPetya, The Most Devastating Cyberattack in History

What is happening in Ukraine’s cyberspace bears discomforting resemblance to the NotPetya attack from 2017 – called the most devastating cyber attack in history. What can we learn from history?

BY Dr. Manuel Hepfer

XXX

War Room

02.2022 . Spotlight

Mutually Assured Destruction – Does Deterrence Work in Cyberspace?

During the Cold War, the concept of ‘mutually assured destruction’ explained the notion that a nuclear attack from one superpower would be met with a retaliation from another. The concept describes the deterrence of conventional warfare. Can the same principle be used in cyberspace?

BY Dr. Manuel Hepfer

XXX
REvil Ransomware Group

01.2022 . Spotlight

Making Sense of the REvil Arrests

The raid and subsequent arrests of members of one of the most prolific ransomware gangs came as a surprise to many observers. Russian officials arrested members of the notorious REvil ransomware group – on the request of the US. In the current high-pressure environment of Ukraine peace talks between the US and Russia, it seems strange that Russia would follow such a request.

BY Dr. Manuel Hepfer

XXX
North Korean Heist

01.2022 . Spotlight

How North Korea Tried to Steal $1 Billion

In what is called the most audacious cybercrime that has ever been attempted, a North Korean linked hacker group named Lazarus, tried to steal $1bn from a national bank. How did they attempt it?

BY Dr. Manuel Hepfer

XXX

The Unusual Suspects

01.2022 . Spotlight

The Unusual Suspects

In the two other Spotlight articles, we expose two nation-state hacker groups. However, not all cyberattacks are carried out by nation-states.

BY Dr. Manuel Hepfer

XXX
The Future of Cybersecurity

12.2021 . Spotlight

Cybersecurity Predictions and Trends

Let’s turn to the future of cybersecurity. What are new and upcoming trends, and what should companies look for in the next years? Gartner has made top 8 predictions for the upcoming year.

BY Dr. Manuel Hepfer

XXX
Log4J

12.2021 . Spotlight

The Log4J Vulnerability

When news broke of the Log4J vulnerability, IT administrators were desperate to find solutions to protect against it. The vulnerability is exposing thousands of applications all around the world to a very simple attack.

BY Dr. Manuel Hepfer

XXX

Get our monthly newsletter, Spotlight, delivered to your inbox.