Print to PDF: Ctrl+P → Destination: Save as PDF → Margins: None → Background graphics: On
Russian state-linked threat group UTA0355 impersonated staff from the Centre for Security, Diplomacy, and Strategy at Vrije Universiteit Brussel, sending fake invitations to the "Brussels Indo-Pacific Dialogue."
Full analysis from Volexity → https://www.volexity.com/blog/2025/12/04/dangerous-invitations-russian-threat-actor-spoofs-european-security-events-in-targeted-phishing-attacks/
You can now import CSV files directly into Easy Cyber Protection — and the AI figures out which columns map to which fields.
Try it now → https://easycyberprotection.com/start
The EU-funded SECURE project — with Belgium's CCB as a consortium partner — opened its first call for proposals on January 28, offering European SMEs grants of up to €30,000 to prepare for the Cyber Resilience Act.
Read the CCB announcement → https://ccb.belgium.be/news/secure-1st-open-call-launching-28-january-offering-support-smes-preparing-cyber-resilience-act
Fortinet confirmed active exploitation of CVE-2026-24858 (CVSS 9.4), an authentication bypass in FortiCloud SSO that allowed any FortiCloud account holder to log into other users' Fortinet devices.
Read the CISA advisory → https://www.cisa.gov/news-events/alerts/2026/01/28/fortinet-releases-guidance-address-ongoing-exploitation-authentication-bypass-vulnerability-cve-2026
On February 3, threat actor "0APT" claimed breaches of three major industrial companies in a single day: BASF (2TB of data), Dassault Systèmes, and Honeywell.
See the February 2026 breach tracker → https://www.breachsense.com/breaches/2026/february/