Cybernews takes a close look at the rise and fall of Trickbot and Conti, featuring Alex Holden’s insight into the behind-the-scenes events that helped expose and weaken one of the most notorious cybercriminal operations in history. Holden shares rare first-hand context on how our visibility into the group and thier internal fractures contributed to the Trickbot and Conti downfall.
Hold Integrity’s Domain Integrity Service has released a major upgrade that significantly expands SSL/TLS visibility, enhances reporting, and introduces new automated detection capabilities to identify suspicious certificate activity faster.
Hold Security indexes and correlates public and private/confidential resources on the Dark Web and Internet to identify malicious and threatening events. Our comprehensive Threat Intelligence Services provide visibility into cyber-criminal activities. We utilize our unique vantage points to derive invaluable intelligence. Hold Security Threat Intelligence Analysts examine threat data and interpret it to eliminate false positives.
Stolen user credentials are among the most frequent causes of breaches. Whether it is your company's employee or user credentials that have been stolen, or if a service provider you trusted with their credentials has experienced a breach, cybercriminals may exploit them for their malicious purposes. Hold Security's world-class stolen credentials recovery services will detect your credentials on the Dark Web and promptly notify you before the cyber criminals have a chance to abuse them.
Hold Security’s Domain Integrity Service provides monitoring and alerting of domain names. We identify possible abuse, phishing, impersonation, or other misuse as it is relevant to our clients and their brands. With simple and flexible portal access or customized reports created by our analysts, your domain names and brands will be protected using comprehensive and swift identification and alerting of new or existing threats.
Organizations and individuals are feeding sensitive corporate data, source code, internal documents, credentials, and security decisions into AI systems without fully understanding the consequences. At the same time, many organizations are blindly relying on AI-generated code, AI security advice, vibe-coded applications, and automated decisions without realizing how often these systems hallucinate, fail, leak information, or confidently make terrible choices.
At the same time, threat actors are having a field day. Criminal groups are using AI to scale phishing, fraud, impersonation, romance scams, malware development, reconnaissance, and even penetration testing operations faster than most defenders can react. Some of the examples we will walk through show AI acting less like a tool and more like an accomplice that helps bad actors refine ideas, automate abuse, and remove skill barriers that used to slow criminals down.
As usual, this is not a theoretical AI hype talk. We will look at practical real-world examples, attacker workflows, operational failures, and the uncomfortable reality that many organizations are already giving AI enough trust and access to become part of their attack surface.