Normal view

Cyber and Physical Risks Targeting the 2026 Winter Olympics

Blogs

Blog

Cyber and Physical Risks Targeting the 2026 Winter Olympics

In this post we analyze the multi-vector threat landscape of the 2026 Winter Olympics, examining how the Games’ dispersed geographic footprint and high digital complexity create unique potential for cyber sabotage and physical disruptions.

SHARE THIS:
Default Author Image
February 5, 2026

The Milano-Cortina 2026 Winter Olympics represent a historic milestone as the first Games co-hosted by two major cities. However, the event’s expansive geographic footprint—covering 22,000 square kilometers across northern Italy—presents a complex security environment. From the metropolitan centers of Milan to the alpine peaks of Cortina d’Ampezzo, security forces are contending with a multi-vector threat landscape.

Kinetic and Physical Security Challenges

The geographically dispersed nature of the Milano-Cortina 2026 Winter Games also creates unique physical security challenges. Because venues are spread across thousands of square kilometers of the Alps, securing transit corridors and ensuring rapid emergency response across different Italian regions—including Lombardy, Veneto, and Trentino—is an incredible logistical hurdle. New tunnels, increased train services, and extended bus routes have been welcomed but create new potential targets for physical disruption by threat actors or protestors.

Terrorist and Extremist Threats

Flashpoint has not identified any terrorist or extremist threats to the Winter Olympic Games. However, lone threat actors in support of international terrorist organizations or domestic violence extremists remain a persistent threat due to the large number of attendees expected and the media attention that this event will attract.

Authorities in northern Italy are investigating a series of sabotage attacks on the national railway network that coincided with the opening of the 2026 Winter Olympic Games. The coordinated incidents—which included arson at a track switch, severed electrical cables, and the discovery of a rudimentary explosive device—caused delays of over two hours and temporarily disabled the vital transport hub of Bologna.

Protests

Flashpoint analysts identified several protests targeting the 2026 Winter Olympics:

  • US Presence and ICE Backlash: Hundreds of demonstrators have participated in protests in central Milan to demand that US ICE agents withdraw from security roles at the upcoming Winter Olympics.
  • Anti-Olympic and Environmental Activism: The most organized opposition comes from the Unsustainable Olympics Committee. They have already staged marches in Milan and Cortina, with more planned for February.
  • Pro-Palestinian Groups: Organizations such as BDS Italia are actively campaigning to boycott the games, demanding that Israel not be permitted to participate. Other pro-Palestinian groups have attempted to disrupt the Torch Relay in several cities and are expected to hold flash mob-style demonstrations in Milan’s Piazza del Duomo during the Opening Ceremony.
  • Labor Strikes: Italy frequently experiences transport strikes, which often fall on Fridays. Because the Opening Ceremony is on Friday, February 6, unions are leveraging this for maximum impact. An International Day of Protest has been coordinated by port and dock workers across the Mediterranean for February 6.

On February 7, a massive protest of approximately 10,000 people near the Olympic Village in Milan descended into violence as a peaceful march against the Winter Games ended in clashes with Italian police. While the majority of demonstrators initially focused on the environmental destruction caused by Olympic infrastructure, a smaller group of masked protestors engaged security forces with flares, stones, and firecrackers.

Cyber Threats Facing the 2026 Winter Olympics

The Milano-Cortina 2026 Winter Olympics will be among the most digitally complex global events, making it a prime target for cyberattacks. The greatest risks stem from familiar tactics such as phishing, spoofed websites, and business email compromise, which exploit human trust rather than technical flaws. With billions of viewers and a vast network of cloud services, vendors, and connected systems, the games create an expansive attack surface under intense operational pressure.

Italy blocked a series of cyberattacks targeting its foreign ministry offices, including one in Washington, as well as Winter Olympics websites and hotels in Cortina d’Ampezzo, with officials attributing the attempts to Russian sources. Foreign Minister Antonio Tajani confirmed the attacks were prevented just days before the Games’ official opening, which began with curling matches on February 4. 

Past Olympic Games show a clear pattern of heightened cyber activity, including phishing campaigns, distributed denial-of-service (DDoS) attacks, ransomware, and online scams targeting both organizers and the public. A mix of cybercriminals, advanced persistent threats, and hacktivists is expected to exploit the event for financial gain, espionage, or publicity. Experts emphasize that improving security awareness, verifying digital interactions, and strengthening supply chain defenses are critical, as the most damaging incidents often arise from ordinary threats amplified by scale and urgency.

Staying Safe at the 2026 Winter Games

The security success of Milano-Cortina 2026 relies on the integration of real-time intelligence, advanced technological safeguards, and public vigilance. As the Games proceed, the intersection of cyber-sabotage and physical protest remains the most likely source of operational disruption.

To stay safe at this year’s Games, participants should:

  1. Download Official Apps: Install the Milano Cortina 2026 Ground Transportation App and the Atm Milano app for real-time updates on transit, road closures, and “guaranteed” travel windows during strikes.
  2. Plan Around Friday Strikes: Be aware that transport strikes (Feb 6, 13, and 20) typically guarantee services only between 6:00 AM – 9:00 AM and 6:00 PM – 9:00 PM. Plan your venue transfers accordingly.
  3. Secure Your Digital Footprint: Avoid public Wi-Fi at major venues. Use a VPN and ensure Multi-Factor Authentication (MFA) is active on all your ticketing and banking accounts.
  4. Stay Clear of Protests: While most demonstrations are expected to be peaceful, they can cause sudden police cordons and transit delays.
  5. Respect the Drone Ban: Unauthorized drones are strictly prohibited over Milan and venue clusters. Leave yours at home to avoid heavy fines or interception by security units.

Stay Safe Using Flashpoint

While there are no current indications of imminent threats of extreme violence targeting the Milano-Cortina 2026 Winter Olympics, the event’s vast geographic footprint and digital complexity demand constant vigilance. Securing an event that spans 22,000 square kilometers requires more than just a physical presence; it necessitates a multi-faceted approach that bridges the gap between digital and kinetic risks.

To effectively navigate the intersection of cyber-sabotage, civil unrest, and logistical challenges, organizations and attendees must adopt a comprehensive strategy that integrates real-time intelligence with proactive security measures. Download Flashpoint’s Physical Safety Event Checklist to learn more.

Request a demo today.

The post Cyber and Physical Risks Targeting the 2026 Winter Olympics appeared first on Flashpoint.

Protecting the Big Game: A Threat Assessment for Super Bowl LX

Blogs

Blog

Protecting the Big Game: A Threat Assessment for Super Bowl LX

This threat assessment analyzes potential physical and cyber threats to Super Bowl LX.

SHARE THIS:
Default Author Image
February 4, 2026
Superbowl LIX Threat Assessment | Flashpoint Blog
Table Of Contents

Each year, the Super Bowl draws one of the largest live audiences of any global sporting event, with tens of thousands of spectators attending in person and more than 100 million viewers expected to watch worldwide. Super Bowl LX, taking place on February 8, 2026 at Levi’s Stadium, will feature the Seattle Seahawks and the New England Patriots, with Bad Bunny headlining the halftime show and Green Day performing during the opening ceremony.

Beyond the game itself, the Super Bowl represents one of the most influential commercial and media stages in the world, with major brands investing in some of the most expensive advertising time of the year. The scale, visibility, and economic significance of the event make it an attractive target for threat actors seeking attention, disruption, or financial gain, underscoring the need for heightened security awareness.

Cybersecurity Considerations

At this time, Flashpoint has not observed any specific cyber threats targeting Super Bowl LX. Despite the absence of overt threats, it remains possible that threat actors may attempt to obtain personal information—including financial and credit card details—through scams, malware, phishing campaigns, or other opportunistic cyber activity.

High-profile events such as the Super Bowl have historically been leveraged as bait for cyber campaigns targeting fans and attendees rather than league infrastructure. In October 2024, the online store of the Green Bay Packers was hacked, exposing customers’ financial details. Previous incidents also include the February 2022 “BlackByte” ransomware attack that targeted the San Francisco 49ers in the lead-up to Super Bowl LVI.

Although Flashpoint has not identified any credible calls for large-scale cyber campaigns against Super Bowl LX at this time, analysts assess that cyber activity—if it occurs—is more likely to focus on fraud, impersonation, and social engineering directed at ticket holders, travelers, and high-profile attendees.

Online Sentiment

Flashpoint is currently monitoring online sentiment ahead of Super Bowl LX. At the time of publishing, analysts have identified pockets of increasingly negative online chatter related primarily to allegations of federal immigration enforcement activity in and around the event, as well as broader political and social tensions surrounding the Super Bowl.

Online discussions include calls for protests and boycotts tied to perceived Immigration and Customs Enforcement (ICE) involvement, as well as controversy surrounding halftime and opening ceremony performers. While sentiment toward the game itself and associated events remains largely positive, Flashpoint continues to monitor for escalation in rhetoric that could translate into real-world activity.

Potential Physical Threats

Protests and Boycotts

Flashpoint analysts have identified online chatter promoting protests in the Bay Area in response to allegations that Immigration and Customs Enforcement (ICE) agents will conduct enforcement operations in and around Super Bowl LX. A planned protest is scheduled to take place near Levi’s Stadium on February 8, 2026, during game-day hours.

At this time, Flashpoint has not identified any calls for violence or physical confrontation associated with these actions. However, analysts cannot rule out the possibility that demonstrations could expand or relocate, potentially causing localized disruptions near the venue or surrounding infrastructure if protesters gain access to restricted areas.

In addition, Flashpoint has identified online calls to boycott the Super Bowl tied to both the alleged ICE presence and controversy surrounding the event’s halftime and opening ceremony performers. Flashpoint has not identified any chatter indicating that players, NFL personnel, or affiliated organizations plan to boycott or disrupt the game or related events.

Terrorist and Extremist Threats

Flashpoint has not identified any direct or credible threats to Super Bowl LX or its attendees from violent extremists or terrorist groups at this time. However, as with any high-profile sporting event, lone actors inspired by international terrorist organizations or domestic violent extremist ideologies remain a persistent risk due to the scale of attendance and global media attention.

Super Bowl LX is designated as a SEAR-1 event, necessitating extensive interagency coordination and heightened security measures. Law enforcement presence is expected to be significant, with layered security protocols, strict access control points, and comprehensive screening procedures in place throughout Levi’s Stadium and surrounding areas. Contingency planning for crowd management, emergency response, and evacuation scenarios is ongoing.

Mitigation Strategies and Executive Protection

Given the absence of specific, identified threats, mitigation strategies for key personnel attending Super Bowl LX focus on general best practices. Security teams tasked with executive protection should remove sensitive personal information from online sources, monitor open-source and social media channels, and establish targeted alerts for potential threats or emerging protest activity.

Physical security teams and protected individuals should also familiarize themselves with venue layouts, emergency exits, nearby medical facilities, and law enforcement presence, and remain alert to changes in crowd dynamics or protest activity in the vicinity of the event.

The nearest medical facilities are:

  • O’Connor Hospital (Santa Clara Valley Healthcare)
  • Kaiser Permanente Santa Clara Medical Center
  • Santa Clara Valley Medical Center
  • Valley Health Center Sunnyvale

Several of these facilities offer 24/7 emergency services and are located within a short driving distance of the stadium.

The primary law enforcement facility near the venue is:

  • Santa Clara Police Department

As a SEAR-1 event, extensive coordination is expected among local, state, and federal law enforcement agencies throughout the Bay Area.

    Stay Safe Using Flashpoint

    Although there are no indications of any credible, immediate threats to Super Bowl LX or attendees at this time, it is imperative to be vigilant and prepared. Protecting key personnel in today’s threat environment requires a multi-faceted approach. To effectively bridge the gap between online and offline threats, organizations must adopt a comprehensive strategy that incorporates open source intelligence (OSINT) and physical security measures. Download Flashpoint’s Physical Safety Event Checklist to learn more.

    Request a demo today.

    CISO Middle East Summit 2026 – Doha

    22 January 2026 at 08:17

    CISO Middle East Summit – Doha, Qatar | 22nd January 2026

    The CISO Middle East Summit 2026, taking place on 22nd January in Doha, Qatar, stands as one of the region’s most anticipated gatherings for cybersecurity leaders, innovators, and policymakers. Under the theme “Digital Freedom & Resilience: The Pillars of Qatar’s Cyber Vision 2030,” the summit will unite key decision-makers from government, critical infrastructure, and enterprise sectors to shape the future of cybersecurity in the Middle East.

    The event will feature thought-provoking discussions, strategic insights, and real-world case studies that address the evolving cyber threat landscape and the increasing need for digital trust, resilience, and collaboration. With participation from senior cybersecurity executives, government representatives, and technology experts, the summit will highlight emerging trends in AI security, regulatory evolution, and national cyber defense.

    Beyond its knowledge-sharing sessions, the CISO Middle East Summit offers a unique networking platform for CISOs, solution providers, and innovators to connect and explore partnerships that drive the region’s cybersecurity maturity. Supported by leading sponsors and media partners, this one-day event in Doha reinforces Qatar’s growing position as a hub for digital innovation and cyber resilience.

    For those driving the next phase of security transformation, this summit is a defining milestone in the Middle East’s cybersecurity journey.

    The post CISO Middle East Summit 2026 – Doha appeared first on CISO MAG | Cyber Security Magazine.

    WAM Morocco

    22 January 2026 at 06:58

    WAM Morocco 2026 is organised by KAOUN International (a subsidiary of Dubai World Trade Centre) and proudly in association with GITEX Africa. The debut event is set to be the continent’s largest tech and start-up event in advanced manufacturing and future mobility.

    WAM Morocco will take place under the auspices of the Moroccan Ministry of Industry and Trade from 20 – 22 January 2026 at Foire Internationale de Casablanca, Morocco. Expected to draw over 350 exhibitors and more than 20,000 high-level corporate buyers, WAM Morocco will be the hub where the entire industrial innovation ecosystem connects and collaborates.

    WAM Morocco features four co-located events World Advanced Future Mobility (WAFM), World Green Energy (WGE), World Pharma Manufacturing (WPM) and World Digital Food Hub (WDFH). Cutting-edge technologies in AI, quantum computing, 3D printing, blockchain and mixed reality will take centre stage at WAM Morocco and drive forward Morocco’s vision of becoming a globally competitive and sustainable manufacturing capital.

    The post WAM Morocco appeared first on CISO MAG | Cyber Security Magazine.

    AI CyberCon Summit 2026

    9 January 2026 at 09:43

    Event Date: 10 January 2026
    Venue: T-Hub, Hyderabad

    AI CyberCon Summit 2026 is India’s leading summit on Artificial Intelligence, Cybersecurity, Fraud Prevention, Digital Trust & Compliance, bringing together:

    CXOs, CISOs, CTOs

    AI Innovators & Cybersecurity Leaders

    Fintech & Enterprise Tech Professionals

    Policymakers & Government Representatives

    500+ Industry Decision Makers

    The summit will feature:

    -High-impact keynotes & panel discussions

    -Live cyberattack simulations & hands-on workshops

    -Sessions on AI governance, AML, Zero Trust & compliance

    -Exhibition zone for technology showcases

    -Strategic networking opportunities

    A powerful platform designed to strengthen India’s secure AI transformation and digital resilience.

    The post AI CyberCon Summit 2026 appeared first on CISO MAG | Cyber Security Magazine.

    CyberWiseCon Europe 2026 

    18 December 2025 at 07:49

    Workshop | May 19 | Vilnius, Lithuania
    Conference | May 20-22 | Vilnius, Lithuania

    CyberWiseCon Europe 2026 Returns to Vilnius — Your Front Line for Cyber Defense

    Four Days of Cybersecurity Insights, Hands-On Learning & Global Security Community | May 19–22, 2026

    Cyber threats are growing more advanced every day and so must the defenders.

    CyberWiseCon Europe 2026, taking place May 19–22 in Vilnius, Lithuania, is the premier event for security professionals, researchers, ethical hackers, and IT leaders working to protect the technologies we rely on.
    Now entering its next edition, CyberWiseCon brings together a global community of cybersecurity experts for four days of deep learning, hands-on experiences, and meaningful networking. With 100+ sessions, practical workshops, and attendees from over 35 countries, this conference is built for those who are serious about strengthening their defense strategies in an increasingly complex threat landscape.

    This isn’t just another security conference—it’s the place where cybersecurity meets wisdom. Whether you’re on the front lines detecting threats, building secure systems, or shaping organizational strategy, you’ll find sessions designed around real-world challenges and actionable solutions.

    Why Attend CyberWiseCon Europe 2026?

    CyberWiseCon focuses on what truly matters: practical cybersecurity knowledge. Every talk, demo, and workshop is crafted to give you insights that you can apply immediately—whether you’re mitigating ransomware attacks, implementing Zero Trust, securing your cloud environment, or combating AI-driven threats.

    Plus, your ticket gives you access to three top conferences under one roof:

    • CyberWiseCon Europe
    • DevDays Europe
    • DevOps Pro Europe

    This unique 3-in-1 experience allows you to explore intersecting areas across cybersecurity, software engineering, and operations—helping you understand and secure the full technology lifecycle.

    You’ll also join a vibrant, international gathering of security engineers, CISOs, risk managers, DevSecOps professionals, ethical hackers, and government experts. Networking flows naturally in the cinema-style venue, workshops, interactive sessions, and the legendary conference afterparty.

    CyberWiseCon is where defenders learn from defenders—and where your next big idea or career connection may begin.

    What to Expect at CyberWiseCon 2026

    • AI-Driven Cyber Threats – Understanding and defending against AI-powered attacks, deepfakes, and autonomous malware
    • Ransomware Evolution – Double extortion, data theft, and next-gen mitigation strategies
    • Cloud Security & Zero Trust – Building resilient architectures for modern enterprises
    • Ethical Hacking & Pen Testing – Live demos, new exploitation methods, and offensive tooling
    • Cyberwarfare & Nation-State Attacks – Trends, geopolitical impacts, and defense frameworks
    • Blockchain & Quantum Security – Emerging technologies and future-proof cryptography
    • IoT & Mobile Security – Securing a rapidly expanding threat surface
    • Privacy, Compliance & Regulation – Staying ahead of tightening global requirements

    Whether you’re securing critical infrastructure, defending SaaS environments, or guiding organizational risk, you’ll gain practical knowledge, essential tools, and fresh perspectives.

    Tickets Now Available.

    Explore the full agenda, meet the speakers, and secure your seat at: https://cyberwisecon.eu/

    Don’t miss your opportunity to join Europe’s most forward-thinking cybersecurity community—and prepare for the
    challenges that lie ahead.

    The post CyberWiseCon Europe 2026  appeared first on CISO MAG | Cyber Security Magazine.

    Insider Risk Summit West

    10 December 2025 at 11:33

    Date: March 18-19, 2026
    Location: Monterey Conference Center, Monterey, CA

    Formerly hosted by Advanced Onion, Inc, Defense Strategies Institute will host the 10th Insider Risk Summit West, March 18-19, 2026, in Monterey, CA.

    The Insider Risk Summit West unites the nation’s leading experts, innovators, and security professionals dedicated to tackling one of today’s most complex challenges — the insider risk. Hosted on the West Coast, this premier forum will bring together voices from big tech, AI, social media, energy, and all levels of government to explore the evolving insider risk landscape and the strategies needed to stay ahead of it.

    What to Expect:

    A Regional Focus on Innovation: Explore insider risk in the heart of the West Coast tech and energy corridor, with sessions tailored to AI, social media, autonomous systems, and utility sectors.

    Federal, State, and Local Collaboration in Action: Engage with representatives from West Coast federal agencies, DOW Commands, and state and local governments working together to advance insider risk prevention and strengthen regional security.

    Insights from Leading Technology and Security Experts: Hear directly from leaders across big tech, AI-driven enterprises, energy, and utilities as they share real-world strategies to safeguard data, protect IP, and strengthen organizational resilience.

    Behavioral Science and Emerging Technology in Practice: Learn how behavioral analytics, AI-enabled detection tools, and cross-sector collaboration are transforming how insider threats are identified and mitigated.

    Key Topics of Discussion:

    • Mitigating insider risk & improving operational resilience through partnership, innovation, & technology
    • Securing innovation: insider risks and the future of big tech
    • Addressing the growing risk of insider attacks as semiconductor demand skyrockets
    • Tackling insider risks at social media enterprises
    • Navigating the future threat landscape in AI, autonomous, & electric vehicles
    • .. and more!

    Registration is now open. Active-duty US military and government employees attend complimentary. Sponsorship & exhibit opportunities are available. For more information, visit https://insiderwest.dsigroup.org/.

    The post Insider Risk Summit West appeared first on CISO MAG | Cyber Security Magazine.

    Bharat Tech Summit Awards 2025

    7 November 2025 at 14:34

    Name : Bharat Tech Summit Awards 2025

    Website: https://www.bharattechawards.com/

    Bharat Tech Summit Awards 2025

    📍 8 November 2025 | Venue: Hotel Taj Ambassador, New Delhi

        Organized by: Global Tech Policy Confederation (GTPC)

        In collaboration with: Confederation of All India Traders (CAIT)

    The Bharat Tech Summit & Awards 2025 stands as India’s most influential convergence of technology, policy, and leadership — an annual celebration that unites innovators, visionaries, and policymakers to shape Bharat’s $20-Trillion Digital Vision 2045.

    Under the theme “Celebrating Visionaries • Igniting Innovation • Empowering Transformation,” this landmark event amplifies Bharat’s technological sovereignty, highlighting advances across Cybersecurity, AI, Cloud, IoT, Semiconductors, and Digital Infrastructure.

    As Bharat accelerates its digital transformation, cyber resilience emerges as the backbone of national progress.

    Sessions led by cybersecurity leaders from Tata Communications, Honda, Palo Alto Networks, PwC, and EY explore:

        • Building Zero-Trust and resilient digital frameworks

        • AI-driven cyber defense and intelligence

        • Securing digital infrastructure for a $20-trillion economy

        • Cyber education and upskilling for national readiness

    The Bharat Tech Summit & Awards 2025 is not merely an event — it’s a movement towards a secure, scalable, and sustainable digital Bharat.

    By fostering collaboration between government, industry, startups, and academia, the summit redefines India’s role in the global technology landscape.

    Join us to celebrate Bharat’s technological evolution — where innovation meets integrity, and leadership inspires transformation.

     

    Learn more at: https://www.bharattechawards.com/

     

    The post Bharat Tech Summit Awards 2025 appeared first on CISO MAG | Cyber Security Magazine.

    Africa Fraud, Security & Compliance Summit – West Africa 2025

    28 October 2025 at 12:08

    Name : Africa Fraud, Security & Compliance Summit – West Africa 2025

    Website: https://www.biiafsc.com/west-africa-edition/

    Africa Fraud, Security & Compliance (AFSC) Summit – West Africa 2025

    📍 28–29 October 2025 | Lagos Marriott Hotel, Ikeja, Nigeria

    The Africa Fraud, Security & Compliance (AFSC) Summit – West Africa brings together the region’s leading regulators, banks, fintechs, and solution providers to strengthen the fight against financial crime and advance digital trust across Africa’s evolving financial ecosystem.

    Now in its West Africa edition, the summit will host C-suite executives, compliance leaders, AML specialists, risk professionals, and technology innovators for two transformative days of insights, networking, and collaboration. Discussions will span key themes including AI-driven fraud prevention, AML/CFT innovation, regulatory technology, cyber resilience, and the psychology of fraud.

    The event will also feature the prestigious AFSC Awards – West Africa, celebrating organizations and individuals who demonstrate excellence in compliance, innovation, and integrity.

    With interactive panel sessions, fireside chats, and an exhibition showcasing cutting-edge technologies, AFSC West Africa 2025 is where strategy meets innovation shaping a secure, compliant, and inclusive financial future for the region.

    The post Africa Fraud, Security & Compliance Summit – West Africa 2025 appeared first on CISO MAG | Cyber Security Magazine.

    Cyber Security Experience 2025

    27 October 2025 at 16:25
    Date: November 27, 2025
    Location: Spant! Conference Centre, Bussum, Netherlands
     
    On Thursday, 27 November 2025, the annual Cyber Security Experience will take place at Spant! Conference Centre in Bussum. This year’s conference presents a program that focuses on realistic case studies, current threats, and the strategic choices organizations face today at the intersection of technology, security, and governance.
    One of the central elements is a talk show moderated by Erik Peekel, featuring:
    • Thomas Schmidt (IT & Cybersecurity Lead for the NATO Summit, on behalf of the Ministry of Foreign Affairs)
    • Rick van der Kleij (Professor of Cyber Resilient Organizations, Avans University of Applied Sciences / Senior Researcher at TNO)
    • Corence Klop (Chief Information Security Officer, Rabobank)
    In this session, they reflect on the organization and cybersecurity of the NATO Summit held on 25 June 2025 in The Hague. They will discuss questions such as: How do you strike the right balance between risk acceptance and control? How do you respond when your organization is suddenly confronted with a digital breach? And what should already be in place beforehand?
    The program also offers a behind-the-scenes look at one of this year’s most talked-about cybersecurity incidents. Clinical Diagnostics, the laboratory that collaborated with Bevolkingsonderzoek Nederland, was hit by a cyberattack. Agnes Bouwman, MT member for Marketing & Communication, will share how the organization responded and what lessons were learned.
    Also discover:
    • Vanderlande Industries – In the roundtable “Third Party Risk under Geopolitical Pressure – Navigating Between Regulation and Reality”Ruud van Oorschot (Senior Groupleader Cyber Defence Organisation & TISO) discusses complex supply chain and third-party risks in an international context.
    • Kennedy Van der Laan – In the session “Deep Dive: Keep Calm and Call Breach Counsel!”Rosalie Brand(Lawyer & Partner Cybersecurity) addresses the legal aspects of cyber incidents, including AI-driven attacks, evolving regulations, and the role of counsel in crisis management.
    • Van Oord Dredging and Marine Contractors B.V. – In “The Tower of Babel in Security: Making the Case for One CISO Capability Map”Edwin Franse (CISO) and Milan van der Meer (Enterprise Security Architect) present a practical model for the role of the CISO in complex organizations with diverse responsibilities.
    In short: an event not to be missed.

    The post Cyber Security Experience 2025 appeared first on CISO MAG | Cyber Security Magazine.

    Cyber Security & Cloud Expo Global 2026

    15 October 2025 at 07:59

    Date: February 4-5, 2026

    Location: Olympia, London, United Kingdom

    Website: https://www.cybersecuritycloudexpo.com/global/

    Join 9,000+ cybersecurity and tech leaders for two days of expert insights, high-level discussions, and premium networking.

    CTOs, IT Directors, Government Officials, Developers, Investors, and industry innovators will gather to explore the latest in cybersecurity and digital transformation.

    With 200+ speakers and hundreds of exhibitors, the event delivers real-world strategies, cutting-edge solutions, and actionable knowledge.

    The dedicated Cyber Security Expo stage will tackle Europe’s most pressing cybersecurity challenges, from emerging threats to industry-specific innovations. Key sectors covered include finance, healthcare, legal, retail, energy, government, and more.

    Don’t miss the chance to expand your expertise, discover new technologies, and connect with decision-makers shaping the future of digital security. Register Now.

    While the event is free to attend, the Gold Pass offers all-access benefits, including enhanced networking opportunities. The code is: MP20

    The post Cyber Security & Cloud Expo Global 2026 appeared first on CISO MAG | Cyber Security Magazine.

    GITEX GLOBAL 2025

    13 October 2025 at 12:50

    GITEX GLOBAL 2025, marking its 45th edition, stands as the world’s largest tech & AI event. For over four decades, it has been the

    premiere gateway for tech creators, investors and enthusiasts to collaborate. This year, the event scales new heights, spanning

    across two mega venues – Dubai World Trade Centre & Dubai Harbour. It offers an unprecedented 40 halls of exhibition space,

    showcasing tech giants and innovative startups in fields like AI, Data Centres, Digi Health & Biotech, Cybersecurity, Intelligent

    Connectivity, Green Impact and more.

    Prepare for five exhilarating days filled with conferences, live-action workshops, matched concierge networking and business

    partnerships. Discover the latest and unseen tech innovations that continue to shape our world.

    The GITEX GLOBAL ecosystem encompasses 11 co-located shows: GITEX GLOBAL, GITEX Cyber Valley, GITEX Digi Health & Biotech,

    GITEX Green Impact, GITEX Quantum Expo, Global Devslam, Expand North Star, GITEX ScaleX, House of Finance, Marketing Mania,

    North Star Green Impact. Central to these shows are innovation, collaboration, and discovery. 200,000+ visitors will explore real-

    world applications of AI and source latest innovations that reduce operating costs and enhance business efficiency.

    For More Information: Visit GITEX GLOBAL 2025

    The post GITEX GLOBAL 2025 appeared first on CISO MAG | Cyber Security Magazine.

    Cyber Security World Asia 2025

    8 October 2025 at 07:39

    Date: October 8-9, 2025
    Location: Marina Bay Sands Expo and Convention Centre, Singapore
    Website: https://www.singaporetechnologyweek.com/cyber-security-world/

    Cyber Security World Asia 2025 returns on 8 – 9 October 2025!

    Over two days, you can:

    • Explore leading technologies that safeguard your enterprise
    • Benchmark solutions side by side for resilience and risk management
    • Get practical insights from experts on securing your digital future

    If strengthening your cyber resilience, protecting customer trust, and ensuring compliance are on your agenda this year, this is the place to make it happen.

    See you this 8-9 October, together with thousands of other cybersecurity professionals representing organisations such as A*STAR, Airbus, Coalition of Cybersecurity in Asia-Pacific, DSTA, Prudential, The Coca-Cola Company and more.

    The post Cyber Security World Asia 2025 appeared first on CISO MAG | Cyber Security Magazine.

    Cyber Secure Forum

    21 August 2025 at 11:56

    Date: November 11, 2025
    Location: Hilton London Canary Wharf, London, United Kingdom
    Website: https://cybersecureforum.co.uk/

    Cyber Secure Forum – Your One-Day Gateway to High-Value Connections

    Celebrating 10 years of bringing industry leaders and innovative solution providers together for a day of powerful networking, insights, and business growth.
    This year marks our 10th anniversary, and we’re making it our biggest and most impactful Cyber Secure Forum yet.
    We know your time is valuable, so we make it count. Simply tell our team who you’d like to meet, and we’ll create a personalised itinerary of one-to-one meetings matched to your needs, preferences, and live projects – so you can focus on what matters most.
    As a buyer, your FREE pass includes:

    • A tailored itinerary of pre-arranged one-to-one meetings
    • Full hospitality throughout the day, including lunch & refreshments
    • Multiple networking opportunities with industry peers
    • Access to our expert-led educational seminar programme
    • Flexible attendance options to suit your schedule

    Register your FREE pass here via our quick booking form.

    For more details on what you can expect as a buyer, contact Josh Kingsmill on 01992 374100 or j.kingsmill@forumevents.co.uk .

    Are you a supplier to the industry?
    Meet face-to-face with pre-qualified, senior decision-makers who have asked to meet you specifically to discuss your products and services – and are actively seeking solutions for upcoming projects.

    Your supplier package includes:

    • A schedule of one-to-one meetings with your chosen prospects
    • A fully equipped stand with electrics, furniture & name board
    • Lunch & refreshments for the full day
    • Detailed delegate profiles in advance
    • Your logo featured in all event marketing
    • Inclusion in our supplier networking sessions

    Buyers attending are seeking solutions in areas such as:

    • UK Cyber Strategy
    • Data Protection
    • Access Control
    • Authentication
    • Cloud Business Continuity
    • Identity Access Management
    • Multi-Factor Authentication
    • AI & Machine Learning
    • Application Security
    • …and much more.

    For more information on supplier partner packages, contact our Event Manager:
    l.cloona@forumevents.co.uk | 01992 374078

    The post Cyber Secure Forum appeared first on CISO MAG | Cyber Security Magazine.

    Qakbot Takedown: A Brief Victory in the Fight Against Resilient Malware

    Blogs

    Blog

    Qakbot Takedown: A Brief Victory in the Fight Against Resilient Malware

    Prior botnet takedowns like Emotet and TrickBot have shown that sophisticated malware operations, like Qakbot, can often rebuild infrastructure and return from disruptions in new forms

    SHARE THIS:
    Default Author Image
    August 30, 2023

    Qakbot takedown and seizure

    A global law enforcement operation has successfully disrupted the infrastructure of the Qakbot botnet, striking a major—though likely temporary—blow to a dominant player in the cybercriminal underground supply chain. 

    Qakbot, familiarly Qbot, has been a major cyber threat since 2007, infecting victims’ computers to steal financial information and distribute additional malware payloads like ransomware. As a result of the takedown, more than 700,000 infected devices worldwide were identified and cleaned of the malware. The DOJ also announced the seizure of $8.6M in cryptocurrency in illicit profits.

    While there is no doubt that the Qakbot takedown is a major win in the fight against cybercrime, it may only provide short-term relief in the fight against a notoriously resilient cybercriminal ecosystem.

    ‘Swiss Army knife’

    A Swiss Army knife of cybercrime tools, Qakbot was a complex malware that opened remote access to victims’ systems, stole credentials and financial information, and downloaded additional malware payloads. Its modular architecture enabled frequent updates to add new capabilities over its 15+ years of operation.

    “The collaborative endeavors of these authoritative bodies exemplify the power of a comprehensive, multi-agency approach, designed to maximize its impact..”

    Ian Gray, VP Of Intelligence

    Qakbot has been a versatile workhorse for cybercriminals. Its banking trojan functionality has been used to pilfer payment information and intercept financial transactions. As a loader, it distributed ransomware such as ProLock to extort victims.

    Qakbot has also powered large-scale spam email campaigns and brute force attacks. Its worm-like spreading kept it entrenched in infected networks. By providing the backdoor access and distribution channel for other malware, Qakbot played a key supporting role in the cybercrime ecosystem. Botnets like Emotet and TrickBot operated similarly, loading additional threats onto compromised systems. These jack-of-all-trades botnets have proven lucrative for their criminal operators.

    A history of temporary relief

    Prior botnet takedowns like Emotet and TrickBot have shown that sophisticated malware operations can often rebuild infrastructure and return from disruptions in new forms.

    In the case of Emotet, the botnet came back online in 2022 using new techniques after its infrastructure was dismantled in 2021. TrickBot also persisted despite takedown attempts and remains an active threat. This resiliency highlights the challenges law enforcement faces in permanently eliminating cyber threats.

    While takedowns temporarily degrade capabilities, dedicated cybercriminal groups adapt to avoid further disruption. New malware families also inevitably emerge to fill the gaps left by larger takedowns. For example, BazarLoader and ZLoader rose to prominence as loader malware after the Emotet takedown.

    Yet despite their disruptions, resilient botnets often return and new ones emerge. After prior actions against Emotet and TrickBot, the lingering demand in underground markets brought them back in adapted new forms. Bots remain attractive tools for cybercriminals thanks to their versatility, automation, and money generating potential.

    While Qakbot’s infrastructure was disrupted, its operators may attempt to rebuild or evolve their techniques. Sustained pressure on botnet financial flows, developer communities, and other aspects of the cybercrime supply chain is needed to deter future attacks. For now, the coordinated Qakbot takedown bought time and degraded the capabilities of a dominant cybercrime player.

    The fight against cybercrime must be persistent and comprehensive

    The Qakbot takedown was effectively coordinated among global governments, including France, Germany, Latvia, Romania, the Netherlands, the UK, and the US, as well as the private sector. The collaborative endeavors of these authoritative bodies exemplify the power of a comprehensive, multi-agency approach, designed to maximize its impact.

    Law enforcement and the private sector should to continue coordinating takedowns while also focusing on detecting new malware variants early, disrupting communication channels, and following the money trails of criminal enterprises.

    Cyber hygiene and threat awareness across organizations must also improve to reduce vulnerability to malware infections, including loaders and trojans that distribute threats like Qakbot. Technical controls like endpoint detection, network monitoring, and patching are also key.

    Ultimately, defeating cybercrime requires comprehensive strategy across law enforcement operations, cybersecurity practices, and international collaboration. The Qakbot takedown represents meaningful progress, but the world must remain vigilant against an adaptable threat landscape.

    Get Flashpoint on your side

    Flashpoint Ignite enables organizations to proactively identify and mitigate cyber and physical risk that could imperil people, places, and assets. To unlock the power of great threat intelligence, get started with a free Flashpoint trial.

    Request a demo today.

    Lost in Transition: A Timeline of Failed Successors to Breach and Raid Forums

    Blogs

    Blog

    Lost in Transition: A Timeline of Failed Successors to Breach and Raid Forums

    The legacy of Raid, Breach, and their ‘successors’ provides an important lens into how data breach communities function and the real-life implications of the information they traffic

    SHARE THIS:
    Table Of Contents
    Table of Contents
    More
    subscribe to our newsletter

    Race to the bottom

    Starting June 24, 2023, visitors to the former domain of Raid Forums were greeted by the avatar of arrested administrator “pompompurin” in tiny handcuffs—an unprecedented trolling of sorts by authorities. 

    Pompompurin, whose real name is Conor Brian Fitzpatrick, became a highly reputable threat actor on the now-defunct top-tier hacking forum Raid Forums and upon its shutdown, founded Breach Forums. Breach Forums continued the legacy of Raid Forums, both as a fixture among the data breach communities and as a law enforcement target. 

    The founder and administrator of Raid Forums, Diogo Santos Coelho (aka “omnipotent), was arrested on January 31, 2022. Fitzpatrick, who has been operating on English- and Russian-language forums under the pompompurin moniker since at least October 2020, was arrested by federal agents on March 15, 2023.

    Now, both Raid Forums and Breach Forums are no more. And ever since their seizures, other threat actors, some of whom were involved in the Breach and Raid, have attempted to continue their legacies in the purpose and services they provide. But it has thus far been a race to the bottom. 

    Insight into the illicit spaces where cyber threat actors operate is vital to any threat intelligence operation. The legacy of Raid, Breach, and their “successors” provides an important lens into how data breach communities function and the real-life implications of the information they traffic. 

    Related reading

    Another One Bites the Dust: The (Apparent) End of Breach Forums

    Read now

    Timeline

    Here is a summary of the recent events that we have observed within cybercriminal communities related, in some way, to Breach Forums and its legacy as a popular home for threat actors. 

    • March 17, 2023: Breach Forums administrator “baphomet” decides to shut down the forum following the March 15 arrest of administrator pompompurin. The Washington Post included Flashpoint analysis in its March 22 coverage on the end of Breach Forums.
    • March 29, 2023: PwnedForum, an identically formatted clone of Breach Forums, launches and quickly gains users and shares compromised data. The forum’s creator, “Sinistery,” solicited forum administrators and developers to volunteer to operate the site. 
    • However, the forum was quickly shut down on April 4, 2023, following a disagreement between Sinistery and forum administrators. A message attempting to sell PwnedForum was briefly advertised on the website before closing. One of the forum’s former main administrators, “Frost,” stated that they were working on a new forum separate from PwnedForum, though they did not provide a timeline.
    • May 29, 2023: “Impotent,” the forum administrator Exposed, leaks the database of 478,870 Raid Forums users.
    • June 4, 2023: PwnedForums posted on Telegram that the notorious leak collective, ShinyHunters, is launching a forum with former Breach Forums admins.
    • Also on June 4, a user posted an advertisement for the Exposed forum, calling it the “new” Breach Forums and inviting the Russian hacktivist collective Killnet to join the forum.
    • June 12, 2023: ShinyHunters launches a new forum called Breach Forums—eponymous by name only.
    • That very same day, Exposed Forums shut down. Its founders, “Impotent” and “Purism,” share that they will no longer support the development of Exposed Forums while cautioning against using the new Breach Forums due to operational security concerns.
    • June 18, 2023: Breach Forums is hacked, and the data breach exposes the personal information of over 4,000 registered members.
    • OnniForums, which appears to have launched in April 2023, took responsibility for the attack. It also claimed to have breached the forum Exposed, using a zero-day vulnerability in the open source forum software MyBB. The data leak included login keys, usernames, email addresses, IP addresses, password hashes, registration dates, members’ last visits and posts, number of posts, last activity, and social media handles with profile links.
    • June 24, 2023: The user database of DarkForums, a relatively new and unknown forum, is breached and leaked, joining the ranks of Raid Forums and the new Breach Forums. 

    Though it is difficult to assess if any of these forums will sufficiently fill the void of the data breach communities that Raid Forums provided, threat actors continue to start new darknet venues—a perpetual cycle that shows the resiliency of illicit communities and forums, despite law enforcement, in-fighting, and the adversarial nature of these communities that lends itself to, well, data breaches. Though there may not be a centralized venue for data breaches, it will not be for a lack of trying … even if it means leaking the databases of their competitors.

    Get Flashpoint on your side

    Flashpoint’s suite of actionable intelligence solutions enables organizations to proactively identify and mitigate cyber and physical risk that could imperil people, places, and assets. To unlock the power of great threat intelligence, get started with a free Flashpoint trial.

    Request a demo today.

    Days of Chaos: How OSINT Helps Us Understand the Putin-Prigozhin Schism

    Blogs

    Blog

    Days of Chaos: How OSINT Helps Us Understand the Putin-Prigozhin Schism

    Social media and messaging platforms like Telegram continue to play a key role in understanding events, rumors, and ideas as they unfold in the Russia-Ukraine war

    Share:
    Default Author Image
    June 28, 2023

    Putin Vs. Prigozhin

    The once-cordial relationship between Vladimir Putin and Yevgeny Prigozhin, commonly known as “Putin’s chef,” has soured completely, marking one of the most compelling storylines in Russia’s now 16-month-long invasion of Ukraine. This particular conflict, however, played out in Russia on June 23 and lasted a scintillating ~36 hours, ending in a schism whose implications continue to reverberate across the world, especially in Russia.

    Mentions count in Flashpoint collections for variations on searches for Prigozhin and the Wagner Group. (Image: Flashpoint)

    Social media and messaging platforms like Telegram continues to play a key role in helping individuals and organizations alike understand events, rumors, and ideas as they unfolded, often in real time. As we describe in this article, and as we highlighted in our popular report on the role of open-source intelligence (OSINT) in the Russia-Ukraine War, organizations are rightfully viewing OSINT as a key element of their intelligence and security operations and leveraging it to understand organizational risk as it relates to the cyber, physical, and informational battlefields of this war.

    Let’s zoom in on two crucial days—June 23 and June 24—of the conflict between Putin and Prigozhin and examine the importance of OSINT in understanding the events, then and now.

    Flashpoint’s physical security intelligence platform showing results for a global search seeking mentions of Prigozhin across OSINT-related collections.

    June 23: Wagner Accuses MOD of Missile Strike, Potential Military Coup Brews

    On June 23, Yevgeny Prigozhin, the founder of the paramilitary company Wagner Group, accused Russia’s Ministry of Defence (MOD) and its leader, Sergei Shoigu, of conducting a missile strike on his mercenaries. Prigozhin claimed that the strike resulted in numerous fatalities. He characterized the MOD as “evil” and called for those responsible to be held accountable. It was unclear whether this move should be classified as a coup, insurrection, mutiny, or hardline bargaining tactic at the time.

    Flashpoint’s physical security intelligence platform showing results across real-time open-source intelligence for terms related to “Prigozhin” and “coup”.

    In retaliation, Prigozhin has appeared to openly advocate for armed resistance against the MOD, adding fuel to an already tense stand-off. Prigozhin warned that “the next move will be ours,” and that those who are responsible for the deaths of the Wagner troops killed today, as well as the deaths of many tens of thousands of Russian soldiers, will be “punished” and “justice” will be “returned,” both to Russia’s armed forces and all of Russia. The MOD has rejected these accusations, claiming that they “do not correspond to reality” and labeling them as an “informational provocation.”

    Round 2: #Shoigu hits back.

    "All the video frames distributed on social networks on behalf of Yevgeny #Prigozhin about the alleged 'strike by the Russian Defense Ministry on the rear camps of the PMC Wagner” do not correspond to reality and are an informational provocation. pic.twitter.com/pBIPdFEdLc

    — Jason Corcoran (@jason_corcoran) June 23, 2023

    The current events, particularly the Wagner Group turning on Putin, can be traced back to the devastating fighting at Bakhmut, where the Wagner Group suffered heavy losses. This battle resulted in significant costs and losses for Russia.

    June 24: Prigozhin’s March To Moscow

    On June 24, Prigozhin announced that Wagner Group, the private military company (PMC) he leads, would cease its march on Moscow, ending what has been widely regarded as an armed insurrection and potential coup attempt targeting Russia’s military and government leadership.

    Flashpoint’s physical security intelligence platform showing search results in Rostov-on-Don.

    In an interesting twist, Belarusian President Lukashenko stepped in, providing a means for Wagner to continue operating in a “legal” manner. This intervention prompted the move of Wagner Group and Prigozhin to Belarus. This is particularly noteworthy as PMCs are technically illegal under Article 359 of the 1996 Russian Criminal Code. As a result of the negotiations, the sides agreed that a “bloodbath” on Russian territory should be averted and de-escalatory steps should be taken. Prigozhin agreed that Wagner would halt its advance on Moscow, which Prigozhin claims Wagner got within 200 kilometers of, and turn back to “go in the opposite direction to [their] field camps.” In return, Wagner personnel would be granted “security guarantees.” 

    Related Blog

    Timeline of Russia’s Invasion of Ukraine: Cyber and Physical Warfare

    Read now

    Prigozhin claims that Wagner had not spilled “a single drop of blood of our fighters” since the start of their march on Russia the day prior. However, Prigozhin claims that Russia’s military had attempted to fire at the PMC during their march, reportedly downing at least one and potentially multiple Russian military helicopters. There are also reports of a fire at a fuel depot in Voronezh, which may have been hit by a Russian helicopter.

    Screengrab of a video posted on a pro-Wagner Telegram channel showing Wagner supporters in Rostov as they demonstrate support to departing Wagner troops. (Image: Telegram)

    Wagner troops seized control of multiple military and administrative buildings in the Russian city of Rostov-on-Don early on Saturday morning and had since reportedly reached Voronezh, which lies 500 kilometers north of the city and on the way to Moscow. On June 24, Russian media reported that Wagner was preparing to leave Rostov-on-Don.

    Since then, the Kremlin has said that Prigozhin would not have to face charges in Russia, but he has been dubbed a “traitor” by Putin. As of this publishing, Prigozhin is allegedly in Belarus, according to the country’s President, Lukashenko, who brokered the deal on Prigozhin behalf.

    Concluding thoughts

    In today’s dynamic geopolitical climate, staying ahead of the curve necessitates more than just monitoring mainstream media. Open-source intelligence collections have emerged as a game-changing tool for keeping abreast of the latest events in Ukraine and Russia, which can help various organizations and sectors sift through vast amounts of information, quickly filter out the noise, and deliver the most salient insights in real-time. The recent events in Russia showcase the value of this intelligence resource in offering a multifaceted perspective on ground realities. 

    Get Flashpoint on your side

    Flashpoint’s suite of actionable intelligence solutions enables organizations to proactively identify and mitigate cyber and physical risk that could imperil people, places, and assets. To unlock the power of great threat intelligence, get started with a free Flashpoint trial.

    Request a demo today.

    ❌