SpecialEurasia took part in the 9th edition of the CISO 360 Global Congress, held in Munich from 24 to 26 June 2025.
This report assesses the strategic implications of the sharp rise in cybercrime in Uzbekistan between 2019 and 2024. The report details how this trend threatens Uzbekistan’s internal security, economic stability, and broader modernisation goals.
This report provides an assessment of confirmed cyber activity targeting US critical infrastructure operational technology (OT) environments. It outlines current threat actor behaviour, key vulnerabilities, and specific defensive actions recommended by both government agencies and private sector specialists.
This report explains the useful ways to gather information from the deep and dark web, focusing on how this helps fight terrorism and cybercrime. It addresses definitions, strategic considerations, legal frameworks, operational security, and technical tools utilised in dark web investigations.
North Korea has established a new cyber warfare unit, Research Centre 227, under the General Staff Reconnaissance Bureau. The centre develops offensive hacking technology that employs artificial intelligence (AI) for cyber espionage, financial plundering, and network disruption
Open Source Intelligence (OSINT) serves as a cornerstone in modern cybersecurity, providing invaluable insights into potential threats and vulnerabilities. In this report, we delve into the wide range of applications of OSINT in cybersecurity, such as penetration testing, red teaming, digital forensics, and threat intelligence.
The ubiquitous presence of technology characterises the current digital age, making it imperative to recognise the crucial role cybersecurity plays. One potent tool in the cybersecurity arsenal is OSINT, a collection of techniques that involve researching from publicly available sources.