Normal view

AI CyberCon Summit 2026

9 January 2026 at 09:43

Event Date: 10 January 2026
Venue: T-Hub, Hyderabad

AI CyberCon Summit 2026 is India’s leading summit on Artificial Intelligence, Cybersecurity, Fraud Prevention, Digital Trust & Compliance, bringing together:

CXOs, CISOs, CTOs

AI Innovators & Cybersecurity Leaders

Fintech & Enterprise Tech Professionals

Policymakers & Government Representatives

500+ Industry Decision Makers

The summit will feature:

-High-impact keynotes & panel discussions

-Live cyberattack simulations & hands-on workshops

-Sessions on AI governance, AML, Zero Trust & compliance

-Exhibition zone for technology showcases

-Strategic networking opportunities

A powerful platform designed to strengthen India’s secure AI transformation and digital resilience.

The post AI CyberCon Summit 2026 appeared first on CISO MAG | Cyber Security Magazine.

CyberWiseCon Europe 2026 

18 December 2025 at 07:49

Workshop | May 19 | Vilnius, Lithuania
Conference | May 20-22 | Vilnius, Lithuania

CyberWiseCon Europe 2026 Returns to Vilnius — Your Front Line for Cyber Defense

Four Days of Cybersecurity Insights, Hands-On Learning & Global Security Community | May 19–22, 2026

Cyber threats are growing more advanced every day and so must the defenders.

CyberWiseCon Europe 2026, taking place May 19–22 in Vilnius, Lithuania, is the premier event for security professionals, researchers, ethical hackers, and IT leaders working to protect the technologies we rely on.
Now entering its next edition, CyberWiseCon brings together a global community of cybersecurity experts for four days of deep learning, hands-on experiences, and meaningful networking. With 100+ sessions, practical workshops, and attendees from over 35 countries, this conference is built for those who are serious about strengthening their defense strategies in an increasingly complex threat landscape.

This isn’t just another security conference—it’s the place where cybersecurity meets wisdom. Whether you’re on the front lines detecting threats, building secure systems, or shaping organizational strategy, you’ll find sessions designed around real-world challenges and actionable solutions.

Why Attend CyberWiseCon Europe 2026?

CyberWiseCon focuses on what truly matters: practical cybersecurity knowledge. Every talk, demo, and workshop is crafted to give you insights that you can apply immediately—whether you’re mitigating ransomware attacks, implementing Zero Trust, securing your cloud environment, or combating AI-driven threats.

Plus, your ticket gives you access to three top conferences under one roof:

  • CyberWiseCon Europe
  • DevDays Europe
  • DevOps Pro Europe

This unique 3-in-1 experience allows you to explore intersecting areas across cybersecurity, software engineering, and operations—helping you understand and secure the full technology lifecycle.

You’ll also join a vibrant, international gathering of security engineers, CISOs, risk managers, DevSecOps professionals, ethical hackers, and government experts. Networking flows naturally in the cinema-style venue, workshops, interactive sessions, and the legendary conference afterparty.

CyberWiseCon is where defenders learn from defenders—and where your next big idea or career connection may begin.

What to Expect at CyberWiseCon 2026

  • AI-Driven Cyber Threats – Understanding and defending against AI-powered attacks, deepfakes, and autonomous malware
  • Ransomware Evolution – Double extortion, data theft, and next-gen mitigation strategies
  • Cloud Security & Zero Trust – Building resilient architectures for modern enterprises
  • Ethical Hacking & Pen Testing – Live demos, new exploitation methods, and offensive tooling
  • Cyberwarfare & Nation-State Attacks – Trends, geopolitical impacts, and defense frameworks
  • Blockchain & Quantum Security – Emerging technologies and future-proof cryptography
  • IoT & Mobile Security – Securing a rapidly expanding threat surface
  • Privacy, Compliance & Regulation – Staying ahead of tightening global requirements

Whether you’re securing critical infrastructure, defending SaaS environments, or guiding organizational risk, you’ll gain practical knowledge, essential tools, and fresh perspectives.

Tickets Now Available.

Explore the full agenda, meet the speakers, and secure your seat at: https://cyberwisecon.eu/

Don’t miss your opportunity to join Europe’s most forward-thinking cybersecurity community—and prepare for the
challenges that lie ahead.

The post CyberWiseCon Europe 2026  appeared first on CISO MAG | Cyber Security Magazine.

Insider Risk Summit West

10 December 2025 at 11:33

Date: March 18-19, 2026
Location: Monterey Conference Center, Monterey, CA

Formerly hosted by Advanced Onion, Inc, Defense Strategies Institute will host the 10th Insider Risk Summit West, March 18-19, 2026, in Monterey, CA.

The Insider Risk Summit West unites the nation’s leading experts, innovators, and security professionals dedicated to tackling one of today’s most complex challenges — the insider risk. Hosted on the West Coast, this premier forum will bring together voices from big tech, AI, social media, energy, and all levels of government to explore the evolving insider risk landscape and the strategies needed to stay ahead of it.

What to Expect:

A Regional Focus on Innovation: Explore insider risk in the heart of the West Coast tech and energy corridor, with sessions tailored to AI, social media, autonomous systems, and utility sectors.

Federal, State, and Local Collaboration in Action: Engage with representatives from West Coast federal agencies, DOW Commands, and state and local governments working together to advance insider risk prevention and strengthen regional security.

Insights from Leading Technology and Security Experts: Hear directly from leaders across big tech, AI-driven enterprises, energy, and utilities as they share real-world strategies to safeguard data, protect IP, and strengthen organizational resilience.

Behavioral Science and Emerging Technology in Practice: Learn how behavioral analytics, AI-enabled detection tools, and cross-sector collaboration are transforming how insider threats are identified and mitigated.

Key Topics of Discussion:

  • Mitigating insider risk & improving operational resilience through partnership, innovation, & technology
  • Securing innovation: insider risks and the future of big tech
  • Addressing the growing risk of insider attacks as semiconductor demand skyrockets
  • Tackling insider risks at social media enterprises
  • Navigating the future threat landscape in AI, autonomous, & electric vehicles
  • .. and more!

Registration is now open. Active-duty US military and government employees attend complimentary. Sponsorship & exhibit opportunities are available. For more information, visit https://insiderwest.dsigroup.org/.

The post Insider Risk Summit West appeared first on CISO MAG | Cyber Security Magazine.

Bharat Tech Summit Awards 2025

7 November 2025 at 14:34

Name : Bharat Tech Summit Awards 2025

Website: https://www.bharattechawards.com/

Bharat Tech Summit Awards 2025

📍 8 November 2025 | Venue: Hotel Taj Ambassador, New Delhi

    Organized by: Global Tech Policy Confederation (GTPC)

    In collaboration with: Confederation of All India Traders (CAIT)

The Bharat Tech Summit & Awards 2025 stands as India’s most influential convergence of technology, policy, and leadership — an annual celebration that unites innovators, visionaries, and policymakers to shape Bharat’s $20-Trillion Digital Vision 2045.

Under the theme “Celebrating Visionaries • Igniting Innovation • Empowering Transformation,” this landmark event amplifies Bharat’s technological sovereignty, highlighting advances across Cybersecurity, AI, Cloud, IoT, Semiconductors, and Digital Infrastructure.

As Bharat accelerates its digital transformation, cyber resilience emerges as the backbone of national progress.

Sessions led by cybersecurity leaders from Tata Communications, Honda, Palo Alto Networks, PwC, and EY explore:

    • Building Zero-Trust and resilient digital frameworks

    • AI-driven cyber defense and intelligence

    • Securing digital infrastructure for a $20-trillion economy

    • Cyber education and upskilling for national readiness

The Bharat Tech Summit & Awards 2025 is not merely an event — it’s a movement towards a secure, scalable, and sustainable digital Bharat.

By fostering collaboration between government, industry, startups, and academia, the summit redefines India’s role in the global technology landscape.

Join us to celebrate Bharat’s technological evolution — where innovation meets integrity, and leadership inspires transformation.

 

Learn more at: https://www.bharattechawards.com/

 

The post Bharat Tech Summit Awards 2025 appeared first on CISO MAG | Cyber Security Magazine.

Africa Fraud, Security & Compliance Summit – West Africa 2025

28 October 2025 at 12:08

Name : Africa Fraud, Security & Compliance Summit – West Africa 2025

Website: https://www.biiafsc.com/west-africa-edition/

Africa Fraud, Security & Compliance (AFSC) Summit – West Africa 2025

📍 28–29 October 2025 | Lagos Marriott Hotel, Ikeja, Nigeria

The Africa Fraud, Security & Compliance (AFSC) Summit – West Africa brings together the region’s leading regulators, banks, fintechs, and solution providers to strengthen the fight against financial crime and advance digital trust across Africa’s evolving financial ecosystem.

Now in its West Africa edition, the summit will host C-suite executives, compliance leaders, AML specialists, risk professionals, and technology innovators for two transformative days of insights, networking, and collaboration. Discussions will span key themes including AI-driven fraud prevention, AML/CFT innovation, regulatory technology, cyber resilience, and the psychology of fraud.

The event will also feature the prestigious AFSC Awards – West Africa, celebrating organizations and individuals who demonstrate excellence in compliance, innovation, and integrity.

With interactive panel sessions, fireside chats, and an exhibition showcasing cutting-edge technologies, AFSC West Africa 2025 is where strategy meets innovation shaping a secure, compliant, and inclusive financial future for the region.

The post Africa Fraud, Security & Compliance Summit – West Africa 2025 appeared first on CISO MAG | Cyber Security Magazine.

Cyber Security Experience 2025

27 October 2025 at 16:25
Date: November 27, 2025
Location: Spant! Conference Centre, Bussum, Netherlands
 
On Thursday, 27 November 2025, the annual Cyber Security Experience will take place at Spant! Conference Centre in Bussum. This year’s conference presents a program that focuses on realistic case studies, current threats, and the strategic choices organizations face today at the intersection of technology, security, and governance.
One of the central elements is a talk show moderated by Erik Peekel, featuring:
  • Thomas Schmidt (IT & Cybersecurity Lead for the NATO Summit, on behalf of the Ministry of Foreign Affairs)
  • Rick van der Kleij (Professor of Cyber Resilient Organizations, Avans University of Applied Sciences / Senior Researcher at TNO)
  • Corence Klop (Chief Information Security Officer, Rabobank)
In this session, they reflect on the organization and cybersecurity of the NATO Summit held on 25 June 2025 in The Hague. They will discuss questions such as: How do you strike the right balance between risk acceptance and control? How do you respond when your organization is suddenly confronted with a digital breach? And what should already be in place beforehand?
The program also offers a behind-the-scenes look at one of this year’s most talked-about cybersecurity incidents. Clinical Diagnostics, the laboratory that collaborated with Bevolkingsonderzoek Nederland, was hit by a cyberattack. Agnes Bouwman, MT member for Marketing & Communication, will share how the organization responded and what lessons were learned.
Also discover:
  • Vanderlande Industries – In the roundtable “Third Party Risk under Geopolitical Pressure – Navigating Between Regulation and Reality”Ruud van Oorschot (Senior Groupleader Cyber Defence Organisation & TISO) discusses complex supply chain and third-party risks in an international context.
  • Kennedy Van der Laan – In the session “Deep Dive: Keep Calm and Call Breach Counsel!”Rosalie Brand(Lawyer & Partner Cybersecurity) addresses the legal aspects of cyber incidents, including AI-driven attacks, evolving regulations, and the role of counsel in crisis management.
  • Van Oord Dredging and Marine Contractors B.V. – In “The Tower of Babel in Security: Making the Case for One CISO Capability Map”Edwin Franse (CISO) and Milan van der Meer (Enterprise Security Architect) present a practical model for the role of the CISO in complex organizations with diverse responsibilities.
In short: an event not to be missed.

The post Cyber Security Experience 2025 appeared first on CISO MAG | Cyber Security Magazine.

Cyber Security & Cloud Expo Global 2026

15 October 2025 at 07:59

Date: February 4-5, 2026

Location: Olympia, London, United Kingdom

Website: https://www.cybersecuritycloudexpo.com/global/

Join 9,000+ cybersecurity and tech leaders for two days of expert insights, high-level discussions, and premium networking.

CTOs, IT Directors, Government Officials, Developers, Investors, and industry innovators will gather to explore the latest in cybersecurity and digital transformation.

With 200+ speakers and hundreds of exhibitors, the event delivers real-world strategies, cutting-edge solutions, and actionable knowledge.

The dedicated Cyber Security Expo stage will tackle Europe’s most pressing cybersecurity challenges, from emerging threats to industry-specific innovations. Key sectors covered include finance, healthcare, legal, retail, energy, government, and more.

Don’t miss the chance to expand your expertise, discover new technologies, and connect with decision-makers shaping the future of digital security. Register Now.

While the event is free to attend, the Gold Pass offers all-access benefits, including enhanced networking opportunities. The code is: MP20

The post Cyber Security & Cloud Expo Global 2026 appeared first on CISO MAG | Cyber Security Magazine.

GITEX GLOBAL 2025

13 October 2025 at 12:50

GITEX GLOBAL 2025, marking its 45th edition, stands as the world’s largest tech & AI event. For over four decades, it has been the

premiere gateway for tech creators, investors and enthusiasts to collaborate. This year, the event scales new heights, spanning

across two mega venues – Dubai World Trade Centre & Dubai Harbour. It offers an unprecedented 40 halls of exhibition space,

showcasing tech giants and innovative startups in fields like AI, Data Centres, Digi Health & Biotech, Cybersecurity, Intelligent

Connectivity, Green Impact and more.

Prepare for five exhilarating days filled with conferences, live-action workshops, matched concierge networking and business

partnerships. Discover the latest and unseen tech innovations that continue to shape our world.

The GITEX GLOBAL ecosystem encompasses 11 co-located shows: GITEX GLOBAL, GITEX Cyber Valley, GITEX Digi Health & Biotech,

GITEX Green Impact, GITEX Quantum Expo, Global Devslam, Expand North Star, GITEX ScaleX, House of Finance, Marketing Mania,

North Star Green Impact. Central to these shows are innovation, collaboration, and discovery. 200,000+ visitors will explore real-

world applications of AI and source latest innovations that reduce operating costs and enhance business efficiency.

For More Information: Visit GITEX GLOBAL 2025

The post GITEX GLOBAL 2025 appeared first on CISO MAG | Cyber Security Magazine.

Cyber Security World Asia 2025

8 October 2025 at 07:39

Date: October 8-9, 2025
Location: Marina Bay Sands Expo and Convention Centre, Singapore
Website: https://www.singaporetechnologyweek.com/cyber-security-world/

Cyber Security World Asia 2025 returns on 8 – 9 October 2025!

Over two days, you can:

  • Explore leading technologies that safeguard your enterprise
  • Benchmark solutions side by side for resilience and risk management
  • Get practical insights from experts on securing your digital future

If strengthening your cyber resilience, protecting customer trust, and ensuring compliance are on your agenda this year, this is the place to make it happen.

See you this 8-9 October, together with thousands of other cybersecurity professionals representing organisations such as A*STAR, Airbus, Coalition of Cybersecurity in Asia-Pacific, DSTA, Prudential, The Coca-Cola Company and more.

The post Cyber Security World Asia 2025 appeared first on CISO MAG | Cyber Security Magazine.

Cyber Secure Forum

21 August 2025 at 11:56

Date: November 11, 2025
Location: Hilton London Canary Wharf, London, United Kingdom
Website: https://cybersecureforum.co.uk/

Cyber Secure Forum – Your One-Day Gateway to High-Value Connections

Celebrating 10 years of bringing industry leaders and innovative solution providers together for a day of powerful networking, insights, and business growth.
This year marks our 10th anniversary, and we’re making it our biggest and most impactful Cyber Secure Forum yet.
We know your time is valuable, so we make it count. Simply tell our team who you’d like to meet, and we’ll create a personalised itinerary of one-to-one meetings matched to your needs, preferences, and live projects – so you can focus on what matters most.
As a buyer, your FREE pass includes:

  • A tailored itinerary of pre-arranged one-to-one meetings
  • Full hospitality throughout the day, including lunch & refreshments
  • Multiple networking opportunities with industry peers
  • Access to our expert-led educational seminar programme
  • Flexible attendance options to suit your schedule

Register your FREE pass here via our quick booking form.

For more details on what you can expect as a buyer, contact Josh Kingsmill on 01992 374100 or j.kingsmill@forumevents.co.uk .

Are you a supplier to the industry?
Meet face-to-face with pre-qualified, senior decision-makers who have asked to meet you specifically to discuss your products and services – and are actively seeking solutions for upcoming projects.

Your supplier package includes:

  • A schedule of one-to-one meetings with your chosen prospects
  • A fully equipped stand with electrics, furniture & name board
  • Lunch & refreshments for the full day
  • Detailed delegate profiles in advance
  • Your logo featured in all event marketing
  • Inclusion in our supplier networking sessions

Buyers attending are seeking solutions in areas such as:

  • UK Cyber Strategy
  • Data Protection
  • Access Control
  • Authentication
  • Cloud Business Continuity
  • Identity Access Management
  • Multi-Factor Authentication
  • AI & Machine Learning
  • Application Security
  • …and much more.

For more information on supplier partner packages, contact our Event Manager:
l.cloona@forumevents.co.uk | 01992 374078

The post Cyber Secure Forum appeared first on CISO MAG | Cyber Security Magazine.

Qakbot Takedown: A Brief Victory in the Fight Against Resilient Malware

Blogs

Blog

Qakbot Takedown: A Brief Victory in the Fight Against Resilient Malware

Prior botnet takedowns like Emotet and TrickBot have shown that sophisticated malware operations, like Qakbot, can often rebuild infrastructure and return from disruptions in new forms

SHARE THIS:
Default Author Image
August 30, 2023

Qakbot takedown and seizure

A global law enforcement operation has successfully disrupted the infrastructure of the Qakbot botnet, striking a major—though likely temporary—blow to a dominant player in the cybercriminal underground supply chain. 

Qakbot, familiarly Qbot, has been a major cyber threat since 2007, infecting victims’ computers to steal financial information and distribute additional malware payloads like ransomware. As a result of the takedown, more than 700,000 infected devices worldwide were identified and cleaned of the malware. The DOJ also announced the seizure of $8.6M in cryptocurrency in illicit profits.

While there is no doubt that the Qakbot takedown is a major win in the fight against cybercrime, it may only provide short-term relief in the fight against a notoriously resilient cybercriminal ecosystem.

‘Swiss Army knife’

A Swiss Army knife of cybercrime tools, Qakbot was a complex malware that opened remote access to victims’ systems, stole credentials and financial information, and downloaded additional malware payloads. Its modular architecture enabled frequent updates to add new capabilities over its 15+ years of operation.

“The collaborative endeavors of these authoritative bodies exemplify the power of a comprehensive, multi-agency approach, designed to maximize its impact..”

Ian Gray, VP Of Intelligence

Qakbot has been a versatile workhorse for cybercriminals. Its banking trojan functionality has been used to pilfer payment information and intercept financial transactions. As a loader, it distributed ransomware such as ProLock to extort victims.

Qakbot has also powered large-scale spam email campaigns and brute force attacks. Its worm-like spreading kept it entrenched in infected networks. By providing the backdoor access and distribution channel for other malware, Qakbot played a key supporting role in the cybercrime ecosystem. Botnets like Emotet and TrickBot operated similarly, loading additional threats onto compromised systems. These jack-of-all-trades botnets have proven lucrative for their criminal operators.

A history of temporary relief

Prior botnet takedowns like Emotet and TrickBot have shown that sophisticated malware operations can often rebuild infrastructure and return from disruptions in new forms.

In the case of Emotet, the botnet came back online in 2022 using new techniques after its infrastructure was dismantled in 2021. TrickBot also persisted despite takedown attempts and remains an active threat. This resiliency highlights the challenges law enforcement faces in permanently eliminating cyber threats.

While takedowns temporarily degrade capabilities, dedicated cybercriminal groups adapt to avoid further disruption. New malware families also inevitably emerge to fill the gaps left by larger takedowns. For example, BazarLoader and ZLoader rose to prominence as loader malware after the Emotet takedown.

Yet despite their disruptions, resilient botnets often return and new ones emerge. After prior actions against Emotet and TrickBot, the lingering demand in underground markets brought them back in adapted new forms. Bots remain attractive tools for cybercriminals thanks to their versatility, automation, and money generating potential.

While Qakbot’s infrastructure was disrupted, its operators may attempt to rebuild or evolve their techniques. Sustained pressure on botnet financial flows, developer communities, and other aspects of the cybercrime supply chain is needed to deter future attacks. For now, the coordinated Qakbot takedown bought time and degraded the capabilities of a dominant cybercrime player.

The fight against cybercrime must be persistent and comprehensive

The Qakbot takedown was effectively coordinated among global governments, including France, Germany, Latvia, Romania, the Netherlands, the UK, and the US, as well as the private sector. The collaborative endeavors of these authoritative bodies exemplify the power of a comprehensive, multi-agency approach, designed to maximize its impact.

Law enforcement and the private sector should to continue coordinating takedowns while also focusing on detecting new malware variants early, disrupting communication channels, and following the money trails of criminal enterprises.

Cyber hygiene and threat awareness across organizations must also improve to reduce vulnerability to malware infections, including loaders and trojans that distribute threats like Qakbot. Technical controls like endpoint detection, network monitoring, and patching are also key.

Ultimately, defeating cybercrime requires comprehensive strategy across law enforcement operations, cybersecurity practices, and international collaboration. The Qakbot takedown represents meaningful progress, but the world must remain vigilant against an adaptable threat landscape.

Get Flashpoint on your side

Flashpoint Ignite enables organizations to proactively identify and mitigate cyber and physical risk that could imperil people, places, and assets. To unlock the power of great threat intelligence, get started with a free Flashpoint trial.

Request a demo today.

Lost in Transition: A Timeline of Failed Successors to Breach and Raid Forums

Blogs

Blog

Lost in Transition: A Timeline of Failed Successors to Breach and Raid Forums

The legacy of Raid, Breach, and their ‘successors’ provides an important lens into how data breach communities function and the real-life implications of the information they traffic

SHARE THIS:
Table Of Contents
Table of Contents
More
subscribe to our newsletter

Race to the bottom

Starting June 24, 2023, visitors to the former domain of Raid Forums were greeted by the avatar of arrested administrator “pompompurin” in tiny handcuffs—an unprecedented trolling of sorts by authorities. 

Pompompurin, whose real name is Conor Brian Fitzpatrick, became a highly reputable threat actor on the now-defunct top-tier hacking forum Raid Forums and upon its shutdown, founded Breach Forums. Breach Forums continued the legacy of Raid Forums, both as a fixture among the data breach communities and as a law enforcement target. 

The founder and administrator of Raid Forums, Diogo Santos Coelho (aka “omnipotent), was arrested on January 31, 2022. Fitzpatrick, who has been operating on English- and Russian-language forums under the pompompurin moniker since at least October 2020, was arrested by federal agents on March 15, 2023.

Now, both Raid Forums and Breach Forums are no more. And ever since their seizures, other threat actors, some of whom were involved in the Breach and Raid, have attempted to continue their legacies in the purpose and services they provide. But it has thus far been a race to the bottom. 

Insight into the illicit spaces where cyber threat actors operate is vital to any threat intelligence operation. The legacy of Raid, Breach, and their “successors” provides an important lens into how data breach communities function and the real-life implications of the information they traffic. 

Related reading

Another One Bites the Dust: The (Apparent) End of Breach Forums

Read now

Timeline

Here is a summary of the recent events that we have observed within cybercriminal communities related, in some way, to Breach Forums and its legacy as a popular home for threat actors. 

  • March 17, 2023: Breach Forums administrator “baphomet” decides to shut down the forum following the March 15 arrest of administrator pompompurin. The Washington Post included Flashpoint analysis in its March 22 coverage on the end of Breach Forums.
  • March 29, 2023: PwnedForum, an identically formatted clone of Breach Forums, launches and quickly gains users and shares compromised data. The forum’s creator, “Sinistery,” solicited forum administrators and developers to volunteer to operate the site. 
  • However, the forum was quickly shut down on April 4, 2023, following a disagreement between Sinistery and forum administrators. A message attempting to sell PwnedForum was briefly advertised on the website before closing. One of the forum’s former main administrators, “Frost,” stated that they were working on a new forum separate from PwnedForum, though they did not provide a timeline.
  • May 29, 2023: “Impotent,” the forum administrator Exposed, leaks the database of 478,870 Raid Forums users.
  • June 4, 2023: PwnedForums posted on Telegram that the notorious leak collective, ShinyHunters, is launching a forum with former Breach Forums admins.
  • Also on June 4, a user posted an advertisement for the Exposed forum, calling it the “new” Breach Forums and inviting the Russian hacktivist collective Killnet to join the forum.
  • June 12, 2023: ShinyHunters launches a new forum called Breach Forums—eponymous by name only.
  • That very same day, Exposed Forums shut down. Its founders, “Impotent” and “Purism,” share that they will no longer support the development of Exposed Forums while cautioning against using the new Breach Forums due to operational security concerns.
  • June 18, 2023: Breach Forums is hacked, and the data breach exposes the personal information of over 4,000 registered members.
  • OnniForums, which appears to have launched in April 2023, took responsibility for the attack. It also claimed to have breached the forum Exposed, using a zero-day vulnerability in the open source forum software MyBB. The data leak included login keys, usernames, email addresses, IP addresses, password hashes, registration dates, members’ last visits and posts, number of posts, last activity, and social media handles with profile links.
  • June 24, 2023: The user database of DarkForums, a relatively new and unknown forum, is breached and leaked, joining the ranks of Raid Forums and the new Breach Forums. 

Though it is difficult to assess if any of these forums will sufficiently fill the void of the data breach communities that Raid Forums provided, threat actors continue to start new darknet venues—a perpetual cycle that shows the resiliency of illicit communities and forums, despite law enforcement, in-fighting, and the adversarial nature of these communities that lends itself to, well, data breaches. Though there may not be a centralized venue for data breaches, it will not be for a lack of trying … even if it means leaking the databases of their competitors.

Get Flashpoint on your side

Flashpoint’s suite of actionable intelligence solutions enables organizations to proactively identify and mitigate cyber and physical risk that could imperil people, places, and assets. To unlock the power of great threat intelligence, get started with a free Flashpoint trial.

Request a demo today.

Days of Chaos: How OSINT Helps Us Understand the Putin-Prigozhin Schism

Blogs

Blog

Days of Chaos: How OSINT Helps Us Understand the Putin-Prigozhin Schism

Social media and messaging platforms like Telegram continue to play a key role in understanding events, rumors, and ideas as they unfold in the Russia-Ukraine war

Share:
Default Author Image
June 28, 2023

Putin Vs. Prigozhin

The once-cordial relationship between Vladimir Putin and Yevgeny Prigozhin, commonly known as “Putin’s chef,” has soured completely, marking one of the most compelling storylines in Russia’s now 16-month-long invasion of Ukraine. This particular conflict, however, played out in Russia on June 23 and lasted a scintillating ~36 hours, ending in a schism whose implications continue to reverberate across the world, especially in Russia.

Mentions count in Flashpoint collections for variations on searches for Prigozhin and the Wagner Group. (Image: Flashpoint)

Social media and messaging platforms like Telegram continues to play a key role in helping individuals and organizations alike understand events, rumors, and ideas as they unfolded, often in real time. As we describe in this article, and as we highlighted in our popular report on the role of open-source intelligence (OSINT) in the Russia-Ukraine War, organizations are rightfully viewing OSINT as a key element of their intelligence and security operations and leveraging it to understand organizational risk as it relates to the cyber, physical, and informational battlefields of this war.

Let’s zoom in on two crucial days—June 23 and June 24—of the conflict between Putin and Prigozhin and examine the importance of OSINT in understanding the events, then and now.

Flashpoint’s physical security intelligence platform showing results for a global search seeking mentions of Prigozhin across OSINT-related collections.

June 23: Wagner Accuses MOD of Missile Strike, Potential Military Coup Brews

On June 23, Yevgeny Prigozhin, the founder of the paramilitary company Wagner Group, accused Russia’s Ministry of Defence (MOD) and its leader, Sergei Shoigu, of conducting a missile strike on his mercenaries. Prigozhin claimed that the strike resulted in numerous fatalities. He characterized the MOD as “evil” and called for those responsible to be held accountable. It was unclear whether this move should be classified as a coup, insurrection, mutiny, or hardline bargaining tactic at the time.

Flashpoint’s physical security intelligence platform showing results across real-time open-source intelligence for terms related to “Prigozhin” and “coup”.

In retaliation, Prigozhin has appeared to openly advocate for armed resistance against the MOD, adding fuel to an already tense stand-off. Prigozhin warned that “the next move will be ours,” and that those who are responsible for the deaths of the Wagner troops killed today, as well as the deaths of many tens of thousands of Russian soldiers, will be “punished” and “justice” will be “returned,” both to Russia’s armed forces and all of Russia. The MOD has rejected these accusations, claiming that they “do not correspond to reality” and labeling them as an “informational provocation.”

Round 2: #Shoigu hits back.

"All the video frames distributed on social networks on behalf of Yevgeny #Prigozhin about the alleged 'strike by the Russian Defense Ministry on the rear camps of the PMC Wagner” do not correspond to reality and are an informational provocation. pic.twitter.com/pBIPdFEdLc

— Jason Corcoran (@jason_corcoran) June 23, 2023

The current events, particularly the Wagner Group turning on Putin, can be traced back to the devastating fighting at Bakhmut, where the Wagner Group suffered heavy losses. This battle resulted in significant costs and losses for Russia.

June 24: Prigozhin’s March To Moscow

On June 24, Prigozhin announced that Wagner Group, the private military company (PMC) he leads, would cease its march on Moscow, ending what has been widely regarded as an armed insurrection and potential coup attempt targeting Russia’s military and government leadership.

Flashpoint’s physical security intelligence platform showing search results in Rostov-on-Don.

In an interesting twist, Belarusian President Lukashenko stepped in, providing a means for Wagner to continue operating in a “legal” manner. This intervention prompted the move of Wagner Group and Prigozhin to Belarus. This is particularly noteworthy as PMCs are technically illegal under Article 359 of the 1996 Russian Criminal Code. As a result of the negotiations, the sides agreed that a “bloodbath” on Russian territory should be averted and de-escalatory steps should be taken. Prigozhin agreed that Wagner would halt its advance on Moscow, which Prigozhin claims Wagner got within 200 kilometers of, and turn back to “go in the opposite direction to [their] field camps.” In return, Wagner personnel would be granted “security guarantees.” 

Related Blog

Timeline of Russia’s Invasion of Ukraine: Cyber and Physical Warfare

Read now

Prigozhin claims that Wagner had not spilled “a single drop of blood of our fighters” since the start of their march on Russia the day prior. However, Prigozhin claims that Russia’s military had attempted to fire at the PMC during their march, reportedly downing at least one and potentially multiple Russian military helicopters. There are also reports of a fire at a fuel depot in Voronezh, which may have been hit by a Russian helicopter.

Screengrab of a video posted on a pro-Wagner Telegram channel showing Wagner supporters in Rostov as they demonstrate support to departing Wagner troops. (Image: Telegram)

Wagner troops seized control of multiple military and administrative buildings in the Russian city of Rostov-on-Don early on Saturday morning and had since reportedly reached Voronezh, which lies 500 kilometers north of the city and on the way to Moscow. On June 24, Russian media reported that Wagner was preparing to leave Rostov-on-Don.

Since then, the Kremlin has said that Prigozhin would not have to face charges in Russia, but he has been dubbed a “traitor” by Putin. As of this publishing, Prigozhin is allegedly in Belarus, according to the country’s President, Lukashenko, who brokered the deal on Prigozhin behalf.

Concluding thoughts

In today’s dynamic geopolitical climate, staying ahead of the curve necessitates more than just monitoring mainstream media. Open-source intelligence collections have emerged as a game-changing tool for keeping abreast of the latest events in Ukraine and Russia, which can help various organizations and sectors sift through vast amounts of information, quickly filter out the noise, and deliver the most salient insights in real-time. The recent events in Russia showcase the value of this intelligence resource in offering a multifaceted perspective on ground realities. 

Get Flashpoint on your side

Flashpoint’s suite of actionable intelligence solutions enables organizations to proactively identify and mitigate cyber and physical risk that could imperil people, places, and assets. To unlock the power of great threat intelligence, get started with a free Flashpoint trial.

Request a demo today.

5 Reasons Taiwan Is a Growing Source of US-China Tension

14 September 2022 at 18:02

Blogs

Blog

5 Reasons Taiwan Is a Growing Source of US-China Tension

Five key indicators that may represent current and future escalations in US-China tensions related to Taiwan. 

SHARE THIS:
Default Author Image
September 14, 2022
Taiwan_1200x628

Introduction

At the end of last year, Flashpoint correctly forecasted that Taiwan would prove critical to US-China relations. In the same way its asserted authority over Hong Kong, recovering Taiwan, we wrote, would also continue to be a primary pillar of China’s geopolitical strategy.

The new Cold War is characterized by Flashpoint as the use of cyber operations as tools of statecraft by major global powers

Fast forward to the present-day, as US-China tensions around the Taiwan Strait are elevated—buttressed by observed trends that may indicate that an increase in Chinese aggression around the Taiwan Strait is likely within the next 6-12 months. 

Here are five key indicators that may represent current and future escalations in US-China tensions related to Taiwan. 

1) Xi’s Third Term and the NPC

China’s National People’s Congress (NPC), scheduled for October 16, is held by the Chinese Communist Party every 5 years. It is considered to be the largest and most important time period for the CCP—this is when it typically announces political priorities as well as senior leadership appointments. This year’s NPC will be the 20th conference since the Party’s founding in 1921; without a planned successor, President Xi will take a third term—a first in CCP history since term limits were officially abolished by President Xi himself.

President Xi has remained vocal about his desire to complete reunification with Taiwan, which was most recently outlined in China’s most recent whitepaper, “The Taiwan Question and China’s Reunification in the New Era.” Notably, this is the first whitepaper that omits China’s desire to reunify with Taiwan peacefully, suggesting that an attempt to forcefully reunify is possible.

2) China’s Show of Might in the Taiwan Strait

Directly following the Speaker Pelosi’s August trip to Taipei, China’s military, the PLA, scheduled a series of live-fire drills around Taiwan, the most impactful particularly occurring from August 4-7 that included short, unprecedented incursions into the “median line” dividing Taiwan from China.

China’s air and sea exercises included several frigates, fighter jets, drones, and cyber attacks, and from the Chinese perspective, demonstrated China’s ability to encircle Taiwan swiftly and effectively on the world stage. The 22 ballistic missiles fired around Taiwan—five of which landed in Japan’s Exclusive Economic Zone (EEZ)—were the first launched near Taiwan since 1996. Additional military exercises around Taiwan occured on August 15, coinciding with the visit of five senior lawmakers from the US Congress.

3) US-Taiwan Economic Partnership

On August 17, the US government announced its intention to begin formal trade negotiations with Taiwan to support US trade facilitation, including its support of state-owned small to medium enterprises in Taiwan. Though the US has maintained that its policy towards Taiwan remains unchanged, the Biden administration has unveiled new initiatives like these to suggest a deepening of the US-Taiwan partnership due to mutually perceived threats to democracy in the Indo-Pacific region. 

On August 30, the Biden administration introduced another lever to its cooperation with Taiwan, announcing a planned $1B arms package with the island nation that will reportedly include “60 anti-ship missiles and 100 air-to-air missiles.” The package, officially approved by Congress on September 2, signals a commitment by the US to help Taiwan defend itself in the event of conflict with China. 

Related Resource

Great Cyber Power’ China and Its Influence Across APAC: Analysis and Timeline

Read now

4) Taiwan Ups Fefense Spending

Taiwan continues to prepare its military for an increased likelihood of conflict with China, including a sharp increase in its announced FY2023 defense budget. On August 25, Taiwan said that it will increase its military budget by 13.9 percent—approximately triple its usual four-to-five percent increase year over year. Several aspects of Taiwan’s military are set to be modernized as well, including its naval capabilities, which will be a key component in any kinetic conflict with China.

5) China Cutting Key Diplomatic Channels with US 

China has made a handful of quiet, diplomatic moves that signal its unhappiness with the current state of US-China relations, including severing cooperation with the US on key mutually beneficial touchpoints, such climate change and counternarcotics. 

On August 25, US Deputy Secretary of State Wendy Sherman met with China’s Ambassador to the US, Qin Gang, to discuss China’s moves to cut diplomatic communication with the US. According to Chinese officials in Beijing, these moves were a series of “demarches” made by China regarding several recent US CODEL visits to Taiwan, including US Indiana Governor Holcomb’s August visit to Taiwan to discuss US-Taiwan semiconductor cooperation.

APAC Intelligence that Drives Decision-Making

To ​see firsthand how Flashpoint can help your organization leverage APAC-centric intelligence to protect critical assets and stakeholders, sign up for a free trial today.

Request a demo today.

❌