

As the pandemic unfolds and countries worldwide go to great lengths in handling the crisis we witness a new evil rising. Secluded in the shadow of the biological hazard follows a wave of digital ones.
Societies worldwide face the challenge of lockdowns and, as a logical consequence, switch a lot of their social and working lives to digital. This opens a lot of opportunities, both for good and bad.

At this point we as a society depend on digital more than ever before. To minimize the spread of COVID-19, people all over the world turn to the web for support. We work from our home office. Artists perform live via streams for our entertainment. We keep in contact with our loved ones, even if we cannot meet in person. We gather the latest news and information online to stay up to date.
But with this, the dark side of the web closes in on us as well: fraudsters, acting as health ministry or WHO officials, extracting personal information or money for fake-tests, criminals spreading fake-news and malware hidden in virus heatmaps or tracking apps, or even attacking healthcare organizations, putting human lives at risk.

[Webcast] COVID-19 – Implications for cybersecurity
[Webcast] COVID-19 – Implications for cybersecurity
14th of Apr
[Webcast] Cybersecurity in a lockdown – Does the new context favour the attacker or the defender?
[Webcast] Cybersecurity in a lockdown – Does the new context favour the attacker or the defender?
16th of Jun
[Webcast] How the shift to home-working impacted the challenge of vulnerability management
[Webcast] How the shift to home-working impacted the challenge of vulnerability management
23rd of JulSurvey Privacy Notice

Orange Cyberdefense supports launch of Romania’s Unified Cybersecurity Architecture, SCUT
16 October 2025

Cyberattack on F5
16 October 2025

Attack Technique: Abuse of the UWP lifecycle and Windows job objects
15 October 2025

Google details Clop extortion campaign leveraging 0-day in Oracle E-Business Suite
7 October 2025

6 of 6 - Forging forward with GenAI
8 October 2025

Broadcom fixes actively exploited 0-day vulnerability in VMware Tools and VMware Aria Operations
30 September 2025

Phishing for clues, part 2: Exploring a year‑long AiTM Phishing Campaign
30 September 2025

Part 2 : The Importance of an Information Position
25 September 2025

ARC Advisory Group