Home » National Security
BGP upstream map highlighting AS30823 (aurologic) feeding multiple high-risk hosting ASNs across Europe

Sanctions vs. Transit: Aeza’s Reliance on aurologic Connectivity

aurologic GmbH (AS30823) operates a multi-terabit backbone out of Langen and connects multiple high-risk hosting providers including sanction-linked entities—giving malware C2 and staging servers durable reach. This analysis explains why upstream neutrality often translates into enablement, how TAEs cluster under aurologic, and what blue teams can do: upstream-aware detections, deny-by-default on risky cones, flowspec/RTBH during incidents, and procurement levers that force faster de-peering.

Read More
Login screen for a video management system showing strong password rules and MFA prompt, with blurred camera tiles in the background

Louvre Password Heist: Weak Credentials, Wide Open Risk

A trivial surveillance password created an opening at one of the world’s most prominent institutions. Intruders gained awareness and timed their move because credential policy failed. This analysis delivers the signals, mitigations, and governance disciplines that stop repeats: rotation, MFA, segmentation, PAM for service accounts, and continuous validation for VMS and NVR stacks—without resorting to list spam or generic advice.

Read More
Engineer reviewing unmanned aerial vehicle in European drone facility under cyber-attack warning

Lazarus Group and the European Drone Industry: What’s at Risk

The state-sponsored Lazarus Group has launched a sophisticated campaign targeting European drone manufacturers under the guise of fake “dream job” offers. As defense firms fall prey to malware disguised in recruitment documents, the threat to aerospace and UAV innovation escalates. This article breaks down how the attack works, what it aims to achieve and how to defend.

Read More