{"id":152,"date":"2025-08-07T10:03:33","date_gmt":"2025-08-07T09:03:33","guid":{"rendered":"https:\/\/conscia.com\/ie\/?page_id=152"},"modified":"2025-09-19T09:48:44","modified_gmt":"2025-09-19T08:48:44","slug":"conscia-threatinsights","status":"publish","type":"page","link":"https:\/\/conscia.com\/ie\/conscia-threatinsights\/","title":{"rendered":"Conscia ThreatInsights"},"content":{"rendered":"\n<section id=\"block_acf-block-68cd18ec30f57\"\n         class=\"hero alignfull  has-brand-background-color hero--is-height-minimal \">\n\t<div class=\"hero__media youtube-object-fit-cover\">\n\t\t\t\t\t<\/div>\n\t\t<div class=\"hero__inner  has-supergraphic has-supergraphic-middle-placement\">\n\t\t<div class=\"hero__inner-blocks\">\n\t\t\t<div>\n\t\t\t\t\n\n<p class=\"spacing-after--6 wp-block-paragraph\">Threat Intelligence newsletter:<\/p>\n\n\n\n<h1 class=\"wp-block-heading spacing-after--6\">Stay one step ahead of cybercrime with&nbsp;Conscia ThreatInsights<\/h1>\n\n\n\n<div class=\"wp-block-buttons spacing-before--0 is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-accent button-size--default\"><a class=\"wp-block-button__link wp-element-button\" href=\"#signup\">Sign up for Threat Intelligence newsletter<\/a><\/div>\n\n\n<\/div>\n\n\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\n<section id=\"block_45a6c2f988d30c8d844730877d7232ee\" class=\"news-ticker alignfull   spacing-before--0 spacing-after--7\">\n\t\t\t<p class=\"news-ticker__label alignwide\">\n\t\t\tLatest blog posts:\t\t<\/p>\n\t\t<div class=\"news-ticker__inner\">\n\t\t\n\t\t\t<a href=\"https:\/\/conscia.com\/ie\/blog\/200-weeks-of-threatinsights-what-our-most%e2%80%91read-articles-tell-us-about-todays-threat-landscape\/\" class=\"news-ticker__item\">\n\t\t\t\t<p class=\"news-ticker__post-type\">Blog<\/p>\n\t\t\t\t<p class=\"news-ticker__title\">200 weeks of ThreatInsights: what our most\u2011read articles tell us about today\u2019s threat landscape<\/p>\n\t\t\t<\/a>\n\n\t\t\t\n\t\t\t<a href=\"https:\/\/conscia.com\/ie\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/\" class=\"news-ticker__item\">\n\t\t\t\t<p class=\"news-ticker__post-type\">Blog<\/p>\n\t\t\t\t<p class=\"news-ticker__title\">New 0-day vulnerabilities in Microsoft Exchange Server actively exploited<\/p>\n\t\t\t<\/a>\n\n\t\t\t\n\t\t\t<a href=\"https:\/\/conscia.com\/ie\/blog\/siems-falling-short-80-of-threat-techniques-go-undetected\/\" class=\"news-ticker__item\">\n\t\t\t\t<p class=\"news-ticker__post-type\">Blog<\/p>\n\t\t\t\t<p class=\"news-ticker__title\">SIEMs falling short: 80% of threat techniques go undetected<\/p>\n\t\t\t<\/a>\n\n\t\t\t\n\t\t\t<a href=\"https:\/\/conscia.com\/ie\/blog\/hackers-turn-advisors-the-500k-irony-of-akira-ransomware-gangs-services\/\" class=\"news-ticker__item\">\n\t\t\t\t<p class=\"news-ticker__post-type\">Blog<\/p>\n\t\t\t\t<p class=\"news-ticker__title\">Hackers Turn Advisors: The $500K Irony of Akira Ransomware Gang&#8217;s Services<\/p>\n\t\t\t<\/a>\n\n\t\t\t\n\t\t\t<a href=\"https:\/\/conscia.com\/ie\/blog\/microsoft-ldap-vulnerabilities-why-cybersecurity-teams-need-to-act-now\/\" class=\"news-ticker__item\">\n\t\t\t\t<p class=\"news-ticker__post-type\">Blog<\/p>\n\t\t\t\t<p class=\"news-ticker__title\">Microsoft LDAP vulnerabilities: Why cybersecurity teams need to act now<\/p>\n\t\t\t<\/a>\n\n\t\t\t\n\t\t\t<a href=\"https:\/\/conscia.com\/ie\/blog\/offensive-security-and-cyber-threat-intelligence-the-dynamic-duo-against-adversaries\/\" class=\"news-ticker__item\">\n\t\t\t\t<p class=\"news-ticker__post-type\">Blog<\/p>\n\t\t\t\t<p class=\"news-ticker__title\">Offensive Security and Cyber Threat Intelligence: The Dynamic Duo Against Adversaries<\/p>\n\t\t\t<\/a>\n\n\t\t\t\n\t\t\t<a href=\"https:\/\/conscia.com\/ie\/blog\/from-captcha-to-compromise-analysis-of-captchaclipper\/\" class=\"news-ticker__item\">\n\t\t\t\t<p class=\"news-ticker__post-type\">Blog<\/p>\n\t\t\t\t<p class=\"news-ticker__title\">From CAPTCHA to Compromise: Analysis of CAPTCHAclipper<\/p>\n\t\t\t<\/a>\n\n\t\t\t\n\t\t\t<a href=\"https:\/\/conscia.com\/ie\/blog\/protecting-your-business-from-supply-chain-attacks-what-to-do-when-third-parties-are-breached\/\" class=\"news-ticker__item\">\n\t\t\t\t<p class=\"news-ticker__post-type\">Blog<\/p>\n\t\t\t\t<p class=\"news-ticker__title\">Protecting Your Business from Supply-Chain Attacks: What to Do When Third Parties Are Breached<\/p>\n\t\t\t<\/a>\n\n\t\t\t\n\t\t\t<a href=\"https:\/\/conscia.com\/ie\/blog\/exploring-the-dark-side-of-generative-ai-the-rise-of-cyber-threats-in-the-digital-age\/\" class=\"news-ticker__item\">\n\t\t\t\t<p class=\"news-ticker__post-type\">Blog<\/p>\n\t\t\t\t<p class=\"news-ticker__title\">Exploring the Dark Side of Generative AI: The Rise of Cyber Threats in the Digital Age<\/p>\n\t\t\t<\/a>\n\n\t\t\t\n\t\t\t<a href=\"https:\/\/conscia.com\/ie\/blog\/openai-sora-cybersecurity-threat-or-opportunity\/\" class=\"news-ticker__item\">\n\t\t\t\t<p class=\"news-ticker__post-type\">Blog<\/p>\n\t\t\t\t<p class=\"news-ticker__title\">OpenAI Sora &#8211; Cybersecurity Threat or Opportunity?<\/p>\n\t\t\t<\/a>\n\n\t\t\t\t<\/div>\n<\/section>\n\t\t<\/section>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile is-image-fill-element  spacing-after--5\"><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading wp-block-paragraph has-heading-m-font-size\">The only threat intelligence newsletter that focuses primarily on Europe<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\"><a href=\"https:\/\/www.forrester.com\/report\/european-cybersecurity-threats-2022\/RES178002\">According to Forrester, European organisations face several different cybersecurity threats compared to their global counterparts<\/a>. And that&#8217;s exactly why Conscia created ThreatInsights \u2013 to deliver European-specific cybersecurity news directly to you.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">ThreatInsights is a free cybersecurity mobile-optimised newsletter that subscribers receive via email every week.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\"><strong>The newsletter contains:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Unbiased, expertly curated cybersecurity insights.<\/li>\n\n\n\n<li>Conscia expert opinions.<\/li>\n\n\n\n<li>Recommendations that enable you and your organisation to stay ahead of threats.<\/li>\n<\/ul>\n\n\n\n<p class=\" wp-block-paragraph\">You are armed with the latest information to help you understand and anticipate industry-specific threats, prioritise patch management, and security control updates.<\/p>\n\n\n\n<p class=\" spacing-after--5 wp-block-paragraph\">ThreatInsights has distinct sections letting you concentrate on what matters to you. Europe in Focus provides a high-level overview, ideal for reading between meetings. Featured News delivers an in-depth look at a particular recent cyber-attack, with expert opinions and recommendations. Other sections include weekly Zero Day Exploits, Dark Web Exposures, and Trending Vulnerabilities.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/conscia.com\/wp-content\/uploads\/2025\/05\/1by1-on-site-4-1024x1024.jpg\" alt=\"\" class=\"wp-image-7448 size-full\" style=\"object-position:50% 50%\"\/><\/figure><\/div>\n\n\n\n\t<section id=\"signup\"\n\t         class=\"marketo-form   spacing-before--0 alignwide has-brand-background-color has-supergraphic has-animated-supergraphic\">\n\t\t\t\t\t\t\t\t<script src=\"\/\/www2.conscia.com\/js\/forms2\/js\/forms2.min.js\"><\/script><form id=\"mktoForm_4764\"><\/form>\n\t\t\t\t\t\t<script>\n\t\t\t\t\t\t\tvar marketoFormSelector = \"4764\";\n\t\t\t\t\t\t\tMktoForms2.setOptions({formXDPath: \"\/rs\/177-CAV-015\/images\/marketo-xdframe-relative.html\"});\n\t\t\t\t\t\t\tMktoForms2.loadForm(\"\/\/www2.conscia.com\", \"177-CAV-015\", marketoFormSelector);\n\t\t\t\t\t\t<\/script><script src=\"\/\/www2.conscia.com\/rs\/177-CAV-015\/images\/recaptchav3script.js\"><\/script>\t<\/section>\n\n\n\n\n<h2 class=\"wp-block-heading alignwide  spacing-before--5 spacing-after--5\">Latest ThreatInsights<\/h2>\n\n\n\n<section id=\"block_acf-block-68cd18ec31331\"\n         class=\"post-query  alignwide is-style-grid\"  data-autoplay=\"false\" data-slides-per-view=\"\">\n\t<div class=\"post-query__grid-wrapper post-query__grid-wrapper--is-style-mosaic\">\n\t\t\t\t\t\t\t\t<div class=\"post-query__grid-item\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/\">\n\t\t<div class=\"post-card__media  has-no-media has-supergraphic has-green-background-color\">\n\t\t\t\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">September 23, 2025<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tNew 0-day vulnerabilities in Microsoft Exchange Server actively exploited\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"post-query__grid-item\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/siems-falling-short-80-of-threat-techniques-go-undetected\/\">\n\t\t<div class=\"post-card__media \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1024x576.jpg\" class=\"post-card__img\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1536x864.jpg 1536w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">September 12, 2025<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tSIEMs falling short: 80% of threat techniques go undetected\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"post-query__grid-item\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/hackers-turn-advisors-the-500k-irony-of-akira-ransomware-gangs-services\/\">\n\t\t<div class=\"post-card__media \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/akira-hd-1024x576.jpg\" class=\"post-card__img\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/akira-hd-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/akira-hd-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/akira-hd-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/akira-hd-1536x864.jpg 1536w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/akira-hd.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">September 1, 2025<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tHackers Turn Advisors: The $500K Irony of Akira Ransomware Gang&#8217;s Services\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"post-query__grid-item\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/microsoft-ldap-vulnerabilities-why-cybersecurity-teams-need-to-act-now\/\">\n\t\t<div class=\"post-card__media \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/16by9-soc-4-1-1024x576.jpg\" class=\"post-card__img\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/16by9-soc-4-1-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/16by9-soc-4-1-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/16by9-soc-4-1-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/16by9-soc-4-1-1536x864.jpg 1536w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/16by9-soc-4-1.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">March 13, 2025<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tMicrosoft LDAP vulnerabilities: Why cybersecurity teams need to act now\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"post-query__grid-item\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/offensive-security-and-cyber-threat-intelligence-the-dynamic-duo-against-adversaries\/\">\n\t\t<div class=\"post-card__media \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-2-1024x576.jpg\" class=\"post-card__img\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-2-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-2-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-2-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-2-1536x864.jpg 1536w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-2.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">December 18, 2024<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tOffensive Security and Cyber Threat Intelligence: The Dynamic Duo Against Adversaries\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"post-query__grid-item\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/from-captcha-to-compromise-analysis-of-captchaclipper\/\">\n\t\t<div class=\"post-card__media \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/recaptcha_606751718-hd-1024x576.jpg\" class=\"post-card__img\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/recaptcha_606751718-hd-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/recaptcha_606751718-hd-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/recaptcha_606751718-hd-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/recaptcha_606751718-hd-1536x864.jpg 1536w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/recaptcha_606751718-hd.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">November 28, 2024<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tFrom CAPTCHA to Compromise: Analysis of CAPTCHAclipper\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"post-query__grid-item\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/protecting-your-business-from-supply-chain-attacks-what-to-do-when-third-parties-are-breached\/\">\n\t\t<div class=\"post-card__media \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/broken-chan_761269086-featured-1024x576.jpg\" class=\"post-card__img\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/broken-chan_761269086-featured-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/broken-chan_761269086-featured-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/broken-chan_761269086-featured-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/broken-chan_761269086-featured-1536x864.jpg 1536w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/broken-chan_761269086-featured.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCollaboration\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">October 16, 2024<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tProtecting Your Business from Supply-Chain Attacks: What to Do When Third Parties Are Breached\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"post-query__grid-item\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/exploring-the-dark-side-of-generative-ai-the-rise-of-cyber-threats-in-the-digital-age\/\">\n\t\t<div class=\"post-card__media \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/ai-deepfake_632957399-hd-1024x576.jpg\" class=\"post-card__img\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/ai-deepfake_632957399-hd-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/ai-deepfake_632957399-hd-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/ai-deepfake_632957399-hd-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/ai-deepfake_632957399-hd-1536x864.jpg 1536w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/ai-deepfake_632957399-hd.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">March 13, 2024<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tExploring the Dark Side of Generative AI: The Rise of Cyber Threats in the Digital Age\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"post-query__grid-item\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/openai-sora-cybersecurity-threat-or-opportunity\/\">\n\t\t<div class=\"post-card__media \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/openai-sora-feature-1024x576.jpg\" class=\"post-card__img\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/openai-sora-feature-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/openai-sora-feature-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/openai-sora-feature-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/openai-sora-feature-1536x864.jpg 1536w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/openai-sora-feature.jpg 2000w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">March 4, 2024<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tOpenAI Sora &#8211; Cybersecurity Threat or Opportunity?\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"post-query__grid-item\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/the-stealthy-cyber-threat-abuse-of-github-for-malicious-purposes\/\">\n\t\t<div class=\"post-card__media \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1-1024x576.jpg\" class=\"post-card__img\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1-1536x864.jpg 1536w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">January 9, 2024<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tThe Stealthy Cyber Threat: Abuse of GitHub for Malicious Purposes\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"post-query__grid-item\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/\">\n\t\t<div class=\"post-card__media \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/mfa_655157230-hd-1024x576.jpg\" class=\"post-card__img\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/mfa_655157230-hd-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/mfa_655157230-hd-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/mfa_655157230-hd-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/mfa_655157230-hd-1536x864.jpg 1536w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/mfa_655157230-hd.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">December 19, 2023<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tUnderstanding the Risks of Unprompted One-Time Passcodes in Cybersecurity\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"post-query__grid-item\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/deep-dive-into-the-may-2023-cyber-attack-on-danish-energy-infrastructure\/\">\n\t\t<div class=\"post-card__media \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/energi-power_631100231-1024x576.jpg\" class=\"post-card__img\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/energi-power_631100231-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/energi-power_631100231-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/energi-power_631100231-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/energi-power_631100231-1536x864.jpg 1536w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/energi-power_631100231.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">November 15, 2023<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tDeep Dive into the May 2023 Cyber Attack on Danish Energy Infrastructure\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"post-query__grid-item\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/what-can-we-learn-from-recent-okta-breaches\/\">\n\t\t<div class=\"post-card__media \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4-1024x576.jpg\" class=\"post-card__img\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4-1536x864.jpg 1536w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">November 8, 2023<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tWhat can we learn from recent Okta breaches?\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"post-query__grid-item\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/new-critical-vulnerability-in-cisco-ios-xe-software-poses-cybersecurity-concerns\/\">\n\t\t<div class=\"post-card__media \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1024x576.jpg\" class=\"post-card__img\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1536x864.jpg 1536w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">October 17, 2023<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tNew Critical Vulnerability in Cisco IOS XE Software Poses Cybersecurity Concerns\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"post-query__grid-item\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/\">\n\t\t<div class=\"post-card__media \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/credit-cards_113236408-1024x576.jpg\" class=\"post-card__img\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/credit-cards_113236408-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/credit-cards_113236408-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/credit-cards_113236408-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/credit-cards_113236408-1536x864.jpg 1536w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/credit-cards_113236408.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">October 11, 2023<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tEnumeration Attacks: A Deep Dive into Threat Actors Generating Valid Payment Data\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"post-query__grid-item\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/adversary-in-the-middle-attack-a-novel-way-to-evade-mfa\/\">\n\t\t<div class=\"post-card__media \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-using-tech-3-1024x576.jpg\" class=\"post-card__img\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-using-tech-3-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-using-tech-3-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-using-tech-3-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-using-tech-3-1536x864.jpg 1536w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-using-tech-3.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">October 3, 2023<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tAdversary-In-The-Middle Attack: A novel way to evade MFA\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"post-query__grid-item\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/how-cybercriminals-exploit-legitimate-internet-services-for-malicious-purposes\/\">\n\t\t<div class=\"post-card__media \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/nil-soc-fearure-image-1024x576.jpg\" class=\"post-card__img\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/nil-soc-fearure-image-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/nil-soc-fearure-image-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/nil-soc-fearure-image-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/nil-soc-fearure-image.jpg 1498w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">September 27, 2023<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tHow Cybercriminals Exploit Legitimate Internet Services for Malicious Purposes\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"post-query__grid-item\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/defending-against-infostealer-malware-attacks-a-comprehensive-guide-for-organizations\/\">\n\t\t<div class=\"post-card__media  has-no-media has-supergraphic-secondary has-green-background-color\">\n\t\t\t\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">September 19, 2023<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tDefending Against Infostealer Malware Attacks: A Comprehensive Guide for Organizations\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"post-query__grid-item\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/cloud-storage-risk-assessment-our-privacy-rests-at-risk\/\">\n\t\t<div class=\"post-card__media \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-using-tech-2-1024x576.jpg\" class=\"post-card__img\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-using-tech-2-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-using-tech-2-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-using-tech-2-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-using-tech-2-1536x864.jpg 1536w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-using-tech-2.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">September 13, 2023<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tCloud Storage Risk Assessment: Our privacy rests&#8230; at risk?\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"post-query__grid-item\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/cl0p-group-analysis-of-europeans-rising-ransomware-threat\/\">\n\t\t<div class=\"post-card__media  has-no-media has-supergraphic has-green-pale-background-color\">\n\t\t\t\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">September 6, 2023<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tCL0P Group &#8211; Analysis of European\u2019s rising ransomware threat\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/section>\n\n\n\n<p class=\" wp-block-paragraph\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Latest ThreatInsights<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"global_solutions":[],"global_partners":[],"global_industries":[],"global_business_outcome":[],"global_types":[],"class_list":["post-152","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Conscia ThreatInsights - Conscia Ireland<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conscia.com\/ie\/conscia-threatinsights\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Conscia ThreatInsights\" \/>\n<meta property=\"og:description\" content=\"Latest ThreatInsights\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conscia.com\/ie\/conscia-threatinsights\/\" \/>\n<meta property=\"og:site_name\" content=\"Conscia Ireland\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-19T08:48:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conscia.com\/wp-content\/uploads\/2025\/05\/1by1-on-site-4-1024x1024.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conscia.com\/ie\/conscia-threatinsights\/\",\"url\":\"https:\/\/conscia.com\/ie\/conscia-threatinsights\/\",\"name\":\"Conscia ThreatInsights - Conscia Ireland\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/ie\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conscia.com\/ie\/conscia-threatinsights\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/ie\/conscia-threatinsights\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/wp-content\/uploads\/2025\/05\/1by1-on-site-4-1024x1024.jpg\",\"datePublished\":\"2025-08-07T09:03:33+00:00\",\"dateModified\":\"2025-09-19T08:48:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conscia.com\/ie\/conscia-threatinsights\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conscia.com\/ie\/conscia-threatinsights\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/conscia-threatinsights\/#primaryimage\",\"url\":\"https:\/\/conscia.com\/wp-content\/uploads\/2025\/05\/1by1-on-site-4-1024x1024.jpg\",\"contentUrl\":\"https:\/\/conscia.com\/wp-content\/uploads\/2025\/05\/1by1-on-site-4-1024x1024.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conscia.com\/ie\/conscia-threatinsights\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conscia.com\/ie\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Conscia ThreatInsights\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conscia.com\/ie\/#website\",\"url\":\"https:\/\/conscia.com\/ie\/\",\"name\":\"Conscia Ireland\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conscia.com\/ie\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conscia.com\/ie\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conscia.com\/ie\/#organization\",\"name\":\"Conscia Ireland\",\"url\":\"https:\/\/conscia.com\/ie\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png\",\"contentUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png\",\"width\":994,\"height\":241,\"caption\":\"Conscia Ireland\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/conscia-ireland\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Conscia ThreatInsights - Conscia Ireland","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conscia.com\/ie\/conscia-threatinsights\/","og_locale":"en_US","og_type":"article","og_title":"Conscia ThreatInsights","og_description":"Latest ThreatInsights","og_url":"https:\/\/conscia.com\/ie\/conscia-threatinsights\/","og_site_name":"Conscia Ireland","article_modified_time":"2025-09-19T08:48:44+00:00","og_image":[{"url":"https:\/\/conscia.com\/wp-content\/uploads\/2025\/05\/1by1-on-site-4-1024x1024.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conscia.com\/ie\/conscia-threatinsights\/","url":"https:\/\/conscia.com\/ie\/conscia-threatinsights\/","name":"Conscia ThreatInsights - Conscia Ireland","isPartOf":{"@id":"https:\/\/conscia.com\/ie\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conscia.com\/ie\/conscia-threatinsights\/#primaryimage"},"image":{"@id":"https:\/\/conscia.com\/ie\/conscia-threatinsights\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/wp-content\/uploads\/2025\/05\/1by1-on-site-4-1024x1024.jpg","datePublished":"2025-08-07T09:03:33+00:00","dateModified":"2025-09-19T08:48:44+00:00","breadcrumb":{"@id":"https:\/\/conscia.com\/ie\/conscia-threatinsights\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conscia.com\/ie\/conscia-threatinsights\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/conscia-threatinsights\/#primaryimage","url":"https:\/\/conscia.com\/wp-content\/uploads\/2025\/05\/1by1-on-site-4-1024x1024.jpg","contentUrl":"https:\/\/conscia.com\/wp-content\/uploads\/2025\/05\/1by1-on-site-4-1024x1024.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/conscia.com\/ie\/conscia-threatinsights\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conscia.com\/ie\/"},{"@type":"ListItem","position":2,"name":"Conscia ThreatInsights"}]},{"@type":"WebSite","@id":"https:\/\/conscia.com\/ie\/#website","url":"https:\/\/conscia.com\/ie\/","name":"Conscia Ireland","description":"","publisher":{"@id":"https:\/\/conscia.com\/ie\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conscia.com\/ie\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/conscia.com\/ie\/#organization","name":"Conscia Ireland","url":"https:\/\/conscia.com\/ie\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/","url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png","contentUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png","width":994,"height":241,"caption":"Conscia Ireland"},"image":{"@id":"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/conscia-ireland\/"]}]}},"_links":{"self":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/pages\/152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/comments?post=152"}],"version-history":[{"count":3,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/pages\/152\/revisions"}],"predecessor-version":[{"id":707,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/pages\/152\/revisions\/707"}],"wp:attachment":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/media?parent=152"}],"wp:term":[{"taxonomy":"global_solutions","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_solutions?post=152"},{"taxonomy":"global_partners","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_partners?post=152"},{"taxonomy":"global_industries","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_industries?post=152"},{"taxonomy":"global_business_outcome","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_business_outcome?post=152"},{"taxonomy":"global_types","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_types?post=152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}