Skip to main content
  • Vulnerability CVE-2022-40648 exploited by Belsen Group

    In 2025, the cyber security landscape was shaken by the official debut of the Belsen Group – a new group that exploited over 15,000 vulnerable configurations of FortiNet firewalls in 144 countries.

    CVE-2022-40648 Cover image
  • 5 Open-source Local AI Tools for Image Generation that work best

    I discovered these interesting open-source Local AI Tools for image generation that run locally. Explore their features, capabilities, and how they empower creativity without relying on cloud services.

    Image generation article cover
  • The Evolution of Cybersecurity Governance: Adapting to a New Era of Risk and Resilience

    Cybersecurity governance has undergone a massive transformation over the past few decades. What once functioned as a peripheral concern, an afterthought to business operation, has now become a central pillar of enterprise risk management.

    GRC Article cover
  • The 18 biggest data breaches of the 21st century

    In today’s data-driven world, data breaches can affect hundreds of millions or even billions of people at a time.

    Data breaches cover image
  • Top 10 Linux Distros in 2025

    Linux is a free and open-source Unix-based operating system. As a result of Linux's security and flexibility, its use is gaining a great deal of attention these days.

    Top 10 Linux Distros
  • Chinese Hackers breach Belgium state security service as investigation continues

    Belgium’s State Security Service (VSSE) has suffered what is being described as its most severe security breach to date.

    Chinese Hackers
  • Chinese Hackers Exploit Check Point VPN Zero-Day to Target Global Organizations

    A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched Check Point VPN vulnerability (CVE-2024-24919) to infiltrate organizations across Europe, Africa, and the Americas, according to cybersecurity researchers.

    Chinese Hackers Exlploit VPN vulnerability
  • Understanding VPNs and Their Role in Online Security

    A Virtual Private Network (VPN) establishes an encrypted tunnel between your device and a secure server, ensuring that all your data remains private and protected from prying eyes.

    Understanding VPNs
  • The Hidden Dangers of Weak Passwords and How to Defend Against Them

    Passwords often go unnoticed until a security breach occurs—only then do users realize their critical role in protecting personal and organizational data.

    Weak Passwords
  • RansomHub: Who is the cyber actor that has surpassed LockBit at the top of ransomware groups?

    The RansomHub group has recently emerged in the ransomware scene, but that doesn’t mean it has failed to gain rapid notoriety for its sophisticated attacks.

    RansomHub

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most severe security breach to date.

For nearly two years, a group of Chinese hackers exploited a vulnerability in Barracuda’s Email Security Gateway Appliance, a cybersecurity tool used by the VSSE, to access approximately 10% of the agency’s email traffic.

The breach, which also impacted the Belgian Pipeline Organisation (BPO), was first revealed in 2023 by Knack and Datanews, but its full extent has only now come to light.

User login