top of page

The Big Data Blog


The 30-Terabit Threat: Why “Firewalled” IoT is the New Air-Gap Myth
On March 19, 2026, a global law enforcement operation led by the U.S. Department of Justice dismantled four of the world’s most prolific IoT botnets : Aisuru, KimWolf, JackSkid, and Mossad . Collectively, these networks enslaved over 3 million devices, ranging from industrial DVRs and routers to smart cameras, and were used to launch record-breaking Distributed Denial of Service (DDoS) attacks peaking at 31.4 Terabits per second (Tbps) . While the sheer volume of the attack
Mar 24


Salt Typhoon and Volt Typhoon: What Critical Infrastructure Operators Need to Know
There is a category of cyber threat that does not trigger alerts, does not install malware, and does not announce itself until the moment it is activated. For CIOs and CISOs leading energy companies, government agencies, financial institutions, and transportation networks, that category is no longer theoretical. It is operational, and already inside networks you may depend on. Salt Typhoon and Volt Typhoon are two state-sponsored threat groups attributed to the People's Rep
Mar 17


AWS Infrastructure Disruption: Technical Analysis of the UAE and Bahrain Incidents
On March 1, 2026, a series of kinetic events involving drone strikes significantly impacted critical cloud infrastructure in the Middle East, specifically affecting the Amazon Web Services (AWS) Middle East (UAE) Region (ME-CENTRAL-1) and the AWS Middle East (Bahrain) Region (ME-SOUTH-1). This incident marks a notable escalation in the physical vulnerability of commercial data centers operating in high-risk or volatile environments. The disruption began in the early mornin
Mar 3


Coordinated Cyberattack on Poland’s Energy Infrastructure: Lessons for Critical OT Security
On 29 December 2025, coordinated cyberattacks struck Poland’s critical infrastructure. At least 30 wind and solar farms were targeted. A large combined heat and power (CHP) plant supplying heat to nearly half a million customers was attacked. A private manufacturing company was also affected. According to CERT Polska , the attacks were purely destructive in nature and represent a significant escalation compared to previously observed incidents. The timing was not incident
Feb 24


“Evilmouse”: How Peripheral Trust Turns into Threat
Security researcher Jonah Owen recently published a project called “Evilmouse.” The concept is simple yet unsettling: a fully functional USB mouse that also functions as a covert keystroke injection device. According to Owen’s documentation, the mouse retains its normal behavior while embedding additional hardware that allows it to emulate a programmable Human Interface Device. Once connected to a target system, it can automatically send scripted keystrokes. The operating
Feb 17


Prompt Bombing: When Authentication Becomes the Attack Surface
As organizations continue to harden their environments with multi-factor authentication (MFA), attackers are adapting by targeting people rather than technical controls. One of the more notable evolutions in this space is prompt bombing , a social engineering technique that exploits authentication workflows themselves rather than traditional phishing channels. Prompt bombing sits at the intersection of identity security, user behavior, and automation . It is not a vulnerabi
Feb 10


AI-Enabled Cybercrime: How Artificial Intelligence Is Changing Cyberattacks
By 2025, artificial intelligence would no longer be an experimental tool for cybercriminals. Multiple industry and policy reports agree that AI fundamentally changed how cybercrime is executed, scaled, and monetized. Attackers increasingly use AI to automate deception, personalize attacks , and reduce the cost and effort required to compromise victims. The World Economic Forum Global Cybersecurity Outlook 2026 identifies AI as the single most significant driver of change i
Feb 3


Why Threat Hunting Matters in Modern Cybersecurity
Most cybersecurity programs focus on prevention and detection. Firewalls, endpoint protection, and intrusion detection systems aim to block known threats or alert on suspicious activity. Although these controls are essential, they are no longer sufficient on their own. Modern attackers intentionally steer clear of noisy methods. They exploit zero-day vulnerabilities, abuse legitimate credentials, and perform lateral movements that mimic typical activity . Often, these actio
Jan 27


European Airports Hit by Ransomware: Third-Party Vendors as Attack Vectors
On September 20, 2025, a cyberattack disrupted passenger check-in and baggage systems at multiple European airports after Collins...
Sep 23, 2025
bottom of page