SafeHorizon newsroom

Latest News

  • 11 January 2026|Blog|1.9 min|

    Initial Access Brokers and why they matter

    Initial Access Brokers (IABs) are specialised cybercriminals who access/infiltrate networks and then sell that access to others, therefore acting as brokers of information (and entry points) in the cybercriminal economy.

  • 22 December 2025|Blog|1.9 min|

    RansomHouse: The Rising Sophistication of Ransomware Toolkits

    RansomHouse RaaS now uses multi-layered encryption and double extortion, hitting critical sectors and showing the need for proactive, adaptive cyber defense.

  • 15 December 2025|Blog|4.9 min|

    CTI good practices with hyperlinks

    Working with CTI means handling risky data safely, use defanging, secure channels, encryption (PGP/E2EE), OPSEC, proper file handling and sandboxing.

  • 11 December 2025|Blog|1.8 min|

    Malware-as-a-Service (MaaS): a new business model

    MaaS turns cybercrime into a paid service, letting even low-skill actors launch sophisticated attacks at scale, driving over half of recent malware threats worldwide.

  • 5 December 2025|Blog|6 min|

    In the labyrinth of cybercrime money laundering

    The laundering of money from cybercrime involves a complex network of transfers, and investigators tracking these funds navigate a maze of cryptocurrency transactions and conversions.

  • 5 December 2025|Blog|5.8 min|

    Online data thieves: how the cybercrime bazaar works

    Cybercrime has evolved into a complex business ecosystem, where malicious tools and stolen data are sold like services. The lone hacker myth is gone, CaaS now fuels today’s digital crime.

  • 27 November 2025|Blog|1.8 min|

    The Role of Blockchain Analytics in the Fight Against Crime-as-a-Service

    Blockchain poses challenges for law enforcement, offering both anonymity for criminals and full transparency through permanent transaction records. With blockchain analytics, investigators can trace fund flows, link related wallets, and track movements across chains, revealing criminal networks and identifying touchpoints with the traditional financial system.

  • 22 November 2025|Blog|1.7 min|

    How Ransomware Actors Leverage Cryptocurrency: A Real-World Use Case

    Ransomware is among today’s most disruptive cyber threats, with cryptocurrency payments enabling attackers to operate globally, quickly, and with relative anonymity.

  • 22 November 2025|Blog|2.5 min|

    The Evolving Phishing Threat: Why Traditional MFA is Failing

    Phishing kits like Tycoon 2FA bypass traditional MFA at scale, exposing a shift toward Phishing-as-a-Service and the need for stronger authentication.

  • 22 November 2025|Blog|2.2 min|

    The Innovation Gap: How Cybercriminals Exploit Emerging Tech Before Law Enforcement Can Respond

    Cybercriminals adopt new tech faster than regulators. Closing the gap means investing in expertise, AI, and global public–private collaboration.

Events