Filter resources

Threat Intelligence newsletter:

Stay one step ahead of cybercrime with Conscia ThreatInsights

Latest blog posts:

The only threat intelligence newsletter that focuses primarily on Europe

According to Forrester, European organisations face several different cybersecurity threats compared to their global counterparts. And that’s exactly why Conscia created ThreatInsights – to deliver European-specific cybersecurity news directly to you.

ThreatInsights is a free cybersecurity mobile-optimised newsletter that subscribers receive via email every week.

The newsletter contains:

  • Unbiased, expertly curated cybersecurity insights.
  • Conscia expert opinions.
  • Recommendations that enable you and your organisation to stay ahead of threats.

You are armed with the latest information to help you understand and anticipate industry-specific threats, prioritise patch management, and security control updates.

ThreatInsights has distinct sections letting you concentrate on what matters to you. Europe in Focus provides a high-level overview, ideal for reading between meetings. Featured News delivers an in-depth look at a particular recent cyber-attack, with expert opinions and recommendations. Other sections include weekly Zero Day Exploits, Dark Web Exposures, and Trending Vulnerabilities.

Image

Latest ThreatInsights

Image
200 weeks of ThreatInsights: what our most‑read articles tell us about today’s threat landscape
Image
29 Minutes: The shrinking window between initial access and full compromise
Image
The OpenClaw security crisis
Image
Cisco Cyber Vision: the game-changer for industrial cybersecurity
Image
From SEO Poisoning to Malware Deployment: Malvertising campaign uncovered
Image
SIEMs falling short: 80% of threat techniques go undetected
Image
Hackers Turn Advisors: The $500K Irony of Akira Ransomware Gang’s Services
Image
Microsoft LDAP vulnerabilities: Why cybersecurity teams need to act now
Image
Offensive Security and Cyber Threat Intelligence: The Dynamic Duo Against Adversaries
Image
From CAPTCHA to Compromise: Analysis of CAPTCHAclipper
Image
Protecting Your Business from Supply-Chain Attacks: What to Do When Third Parties Are Breached
Image
Exploring the Dark Side of Generative AI: The Rise of Cyber Threats in the Digital Age
Image
OpenAI Sora – Cybersecurity Threat or Opportunity?
Image
The Stealthy Cyber Threat: Abuse of GitHub for Malicious Purposes
Image
Understanding the Risks of Unprompted One-Time Passcodes in Cybersecurity
Image
Deep Dive into the May 2023 Cyber Attack on Danish Energy Infrastructure
Image
What can we learn from recent Okta breaches?
New Critical Vulnerability in Cisco IOS XE Software Poses Cybersecurity Concerns
Image
Enumeration Attacks: A Deep Dive into Threat Actors Generating Valid Payment Data
Image
Adversary-In-The-Middle Attack: A novel way to evade MFA
How Cybercriminals Exploit Legitimate Internet Services for Malicious Purposes
Image
Defending Against Infostealer Malware Attacks: A Comprehensive Guide for Organizations
Image
Cloud Storage Risk Assessment: Our privacy rests… at risk?
Image
Understanding Vulnerability Lifecycle to Better Combat Exploits
CL0P Group – Analysis of European’s rising ransomware threat
Image
Danish cloud-hosting provider hit by devastating ransomware attack.
Image
A look into Living off the Land adversarial technique
Image
How could AI simplify malware attacks, and why is this worrying?
Image
Digital Forensics: Discovering Threat Actor’s traces using Recycle Bin
Image
Season’s Greetings from Cybercriminals
Image
Phishing as a Service (PHaaS) – an effective attack vector for all threat actors
New 0-day vulnerabilities in Microsoft Exchange Server actively exploited
Insider Threats: What are they and how to mitigate them
Image
Diving Deep: How to detect Malware Persistency pt. 1
Image
Diving Deep: How to detect Typosquatting
Image
Vulnerability Spotlight: How to detect Follina the Windows MSDT 0-day 
Image
Diving Deep: Malware Injection Techniques
Image
Ransomware-as-a-Service: An infamously lucrative business model
Conti Ransomware Gang falls apart
Image
Increased threat against industries leveraging ICS and SCADA devices
Image
What you need to know about the increased Digital Risks following the cyber-attacks on Ukraine