SafeHorizon newsroom
Latest News

Join the GroundUp Hackathons: create innovations for Real-World CBRNE Challenges
Malware - short for malicious software - remains one of the most pervasive threats in cyberspace, encompassing various types of malicious code designed to disrupt, damage, or gain unauthorised access to computer systems.

RansomHouse: The Rising Sophistication of Ransomware Toolkits
RansomHouse RaaS now uses multi-layered encryption and double extortion, hitting critical sectors and showing the need for proactive, adaptive cyber defense.

CTI good practices with hyperlinks
Working with CTI means handling risky data safely, use defanging, secure channels, encryption (PGP/E2EE), OPSEC, proper file handling and sandboxing.

Malware-as-a-Service (MaaS): a new business model
MaaS turns cybercrime into a paid service, letting even low-skill actors launch sophisticated attacks at scale, driving over half of recent malware threats worldwide.

In the labyrinth of cybercrime money laundering
The laundering of money from cybercrime involves a complex network of transfers, and investigators tracking these funds navigate a maze of cryptocurrency transactions and conversions.

Online data thieves: how the cybercrime bazaar works
Cybercrime has evolved into a complex business ecosystem, where malicious tools and stolen data are sold like services. The lone hacker myth is gone, CaaS now fuels today’s digital crime.

The Role of Blockchain Analytics in the Fight Against Crime-as-a-Service
Blockchain poses challenges for law enforcement, offering both anonymity for criminals and full transparency through permanent transaction records. With blockchain analytics, investigators can trace fund flows, link related wallets, and track movements across chains, revealing criminal networks and identifying touchpoints with the traditional financial system.

How Ransomware Actors Leverage Cryptocurrency: A Real-World Use Case
Ransomware is among today’s most disruptive cyber threats, with cryptocurrency payments enabling attackers to operate globally, quickly, and with relative anonymity.

The Evolving Phishing Threat: Why Traditional MFA is Failing
Phishing kits like Tycoon 2FA bypass traditional MFA at scale, exposing a shift toward Phishing-as-a-Service and the need for stronger authentication.

The Innovation Gap: How Cybercriminals Exploit Emerging Tech Before Law Enforcement Can Respond
Cybercriminals adopt new tech faster than regulators. Closing the gap means investing in expertise, AI, and global public–private collaboration.
Events

Joint Stakeholder Workshop – PRESERVE, SafeHorizon, ENSEMBLE, and LEA Projects Cluster
We invite you to a joint stakeholder workshop organised by PRESERVE, SafeHorizon, and ENSEMBLE, together with the LEA Projects Cluster, led by Privanova.

IMTrustSec: International Workshop on Incident Management, Trusted Computing, Open Hardware, and Advanced Security Attacks
GICP - Cybersecurity and Privacy Protection Research Group is organising IMTrustSec 2025 – The International Workshop on Incident Management, Trusted Computing, Open Hardware, and Advanced Security Attacks, in collaboration with Diana Berbecaru.

Workshop on Cryptographic Tools for Blockchain
Join us in Madrid for the Workshop on Cryptographic Tools for Blockchain, affiliated with Eurocrypt 2025! Organised by top experts, including David Arroyo (CSIC/GICP, SafeHorizon Project partner), this one-day event will explore cutting-edge cryptographic innovations for DLT ecosystems.

Research and Science Conference 2024/2025 (CEPOL)
The Vicomtech team will participate in the European Union Agency for Law Enforcement Training (CEPOL) Research and Science Conference 2024/2025 in Rome (25–27 March 2025).

SafeHorizon and Tampere University host Hands-On Workshop #1: The Dark Web
The SafeHorizon Project EU and Tampere University are hosting an online hands-on workshop on Dec 17th 2024.


