Unveiling “Lucid” – A Silent Enabler of Financial Fraud
Unveiling “Lucid” – A Silent Enabler of Financial Fraud Lucid is a rising but under-the-radar Phishing-as-a-Service (PhaaS) platform that’s quietly fueling large-scale financial fraud across the globe. Built by Chinese-speaking threat actors, it supports phishing campaigns targeting over 200 organizations in 80+ countries, enabling cybercriminals to steal payment card data with ease. The group stands […]
The governance of the PQC transition in the EU
This intervention will analyse the aspects of the governance of the PQC transition in the EU. It will explore the relevant provisions in the EU legal acts containing general implicit requirements to adopt PQC (e.g. NIS2, CRA, GDPR, DORA, eIDAS2 and other) and how they are complimented by the various policy documents making specific references […]
The Cyclotron public private collaboration journey
Share incident and threat data in public–private collaboration, do analyses together and create and distribute the findings to all relevant organizations in the Netherlands. In this way, we can make the Netherlands an unattractive target for digital attacks. What have we been doing in our current journey of public-private collaboration? Let’s develop, automate and secure […]
The Digital Edge in Modern Battlefield Conflict
This presentation explores the evolving role of cyber operations in modern conflict. It discusses cyber’s influence as the “5th domain,” leveraged by Russian aligned actors during the invasion of Ukraine. It delves into the nature of cyber operations, in alignment with kinetic actions. Additionally, highlighting their use in disrupting command and control, targeting critical infrastructure […]
The Attribution Minefield in Ransomware Investigations
Ransomware attacks pose a growing threat to both digital and physical infrastructures. When a ransomware incident occurs, victim organizations often face pressure to restore operations quickly—even if that means paying the ransom. However, payment introduces serious legal and financial risks: if the attacker is a sanctioned entity, making a payment could result in violation of […]
Scanning the Dutch Healthcare’s External Attack Surface
What are the riskiest technologies used in the Dutch healthcare sector? Do people still expose RDP? Is Dutch healthcare data processed inside the European Union? Z-CERT regularly scans many IPs and domains in use by the Dutch Healthcare sector. In this talk, we will share insights from performing External Attack Surface Management (EASM) on hundreds […]
SBOM: beyond simply listing CVEs
Organizations need to manage cybersecurity risks in increasingly complex IT and OT infrastructures that are comprised of heterogeneous systems and services, both on-premise and in the cloud. Many of these components are produced or provided by third parties, exposing organizations to various risks that need to be carefully managed and mitigated (a.o. to prepare for […]
Researchers vs. Threat Actors in Cloud Attacks
Security researchers push the boundaries of what’s possible. (Nation-state) threat actors push the boundaries of what’s exploitable. In this talk, a cloud security researcher and a threat intelligence analyst team up to explore how cutting-edge cloud attack research is rapidly weaponized by espionage threat groups. We’ll walk through real-world examples where newly published techniques – […]
ReArming Europe: Cyber Sovereignty Starts Now
Europe faces a decisive moment in cybersecurity. As digital threats escalate and alliances shift, the question is whether Europe will lead in cybersecurity or stay dependent. The EU’s ReArm Europe / Readiness 2030 shows intent, but funding alone won’t deliver sovereignty. Drawing on experience from U.S. Cyber Command, NSA, and the Defense Intelligence Agency, and […]
Outlook One Financial Threat Landscape
The FI-ISAC is pleased to present the One Financial Threat Landscape. FI-ISAC. Through collaboration, we create the One Financial Threat Landscape. The One Financial Threat Landscape provides insight into the 10 biggest threats facing our industry. It is a product created by the financial sector, used by the financial sector, but delivering value across the […]