- The technological leaps of the Fourth Industrial Revolution may have made production machinery more efficient, but these have also put manufacturers in the crosshairs of cybercriminals. Our research tackles the risks that computer numerical control (CNC) machines now face as they’re integrated into today’s networked factories.The photos, videos, and audio posts we put online expose sensitive biometric patterns that can be abused by cybercriminals. These patterns are virtually unchangeable and can be used now or in future attacks.Our research on APT group Earth Aughisky (aka Taidoor) lists the observed malware, connections, and developments attributed to the group. We also include our insights on the possible implications of changes in the organization's activities for their current and future victims.Our research takes an in-depth look at the security flaws that we found in the logistics API implementation of e-commerce platforms that can potentially leak the private information of consumers.Innovators are diving into a new and immersive virtual space, but with new technology comes new threats. We bring forward possible problematic issues that metaverse pioneers should be wary of.Our research uncovers the tools and techniques used by Earth Berberoka across different platforms to target online gambling sites.The Data Distribution Service (DDS) standard drives thousands of systems every day as a middleware component for machine-to-machine communication with real-time requirements.Our research into cloud-based cryptocurrency mining sheds light on the malicious actor groups involved in this space, their ongoing battle for cloud resources, and the actual extent of the impact of their attacks.SMS PVA services allow their customers to create disposable user profiles or register verified accounts on many popular platforms. Unfortunately, criminals can misuse these services to conduct fraud or other malicious activities.