Home Archive by category Security Services

Security Services

Mercury AI: Digital Shield of the Future

The Mercury AI next-generation digital shield demonstrates how AI technology is redefining the security of our environment.

In a world changing faster than most ever imagined, the issue of security has ceased to be a question without an answer or something beyond our influence; it has become a part of our daily lives in an environment full of challenges. To properly address one of the most vital concerns for every individual—their safety and the safety of their loved ones—it is necessary to utilize the latest modern achievements. This includes not only traditional “hard security,” such as armed police and physical barriers, but also the “soft,” almost invisible hand of security that utilizes cameras, smart software, and Artificial Intelligence. At the center of this new technology, which helps us feel safer than ever before, is the company The Mercury AI, specialized in the latest digital advancements in the field of security with its “digital shield.”

Most people do not think about security until they have to. However, the environment in which we live and work is changing so rapidly that one must react quickly to new challenges, while the reality unfortunately remains that most security systems still operate under the old rule—react only after something has already happened. But if we already possess technology that can recognize a problem early, why should we wait for it to become an incident? That is why we created the digital shield—a weapon detection platform that uses artificial intelligence to identify potential threats before they turn into problems. Security should come through prevention, not reaction.

A Watchful Eye That Never Blinks

What exactly is the digital shield? The core of this system is not just in “recording the environment,” but in understanding what is happening in real-time. While the human factor is naturally subject to fatigue, loss of concentration, or a limited field of vision, The Mercury AI platform offers constant surveillance that knows no breaks and functions 24 hours a day, seven days a week.

The main advantage of this technology over existing ones is the specialized AI algorithm. Unlike ordinary security cameras that merely transmit an image, this system performs a constant analysis of every video frame. It establishes instantaneous visual contact with any form of weaponry—whether it be firearms or bladed weapons like knives.

But that is not all. What sets this system apart in the market is its incredible accuracy. Namely, the biggest problem with automated systems is “false alarms” that can cause panic and unnecessary costs. Our platform, however, makes a precise distinction in a fraction of a second between a dangerous object and harmless everyday items like phones, keys, or tools. This achieves a dual goal: maximum vigilance while eliminating unnecessary stress.

Silent Guard: Discretion as a Priority

As we have started to grow accustomed to relaxed and safe work environments, one of the greatest challenges in introducing high-security measures into public spaces is maintaining a pleasant atmosphere. No one wants to feel like they are in a high-security “prison” with an “all-seeing eye” at every turn in a shopping mall or school. Although citizens know that surveillance cameras are all around, it is natural that they do not want them to be intrusive. This is where silent and discreet monitoring comes into play.

The system functions almost invisibly, operating in the background of existing video infrastructure. It does not require bulky installations that would disturb the public or ruin the aesthetics of the space. While life goes on normally, the AI silently scans the surroundings 24/7. This continuous security support provides a level of protection that the human eye, no matter how well-trained, simply cannot maintain at every moment and on every square meter of a facility.

Automation That Saves Lives

The greatest advantage of such a system is, of course, in crisis situations, where every second is literally a matter of life and death. Statistics show that the highest number of casualties in incidents occurs during those crucial minutes spent waiting for emergency services to be called and for them to arrive on the scene. The digital shield solves this problem through automated rapid response.

The moment the algorithm detects a threat, the system does not wait for someone to press a button. It automatically triggers a series of predefined protocols:

Instant Notifications: Security teams and police receive an alarm with the exact location and visual evidence of the threat in real-time. Smart Locking: The system can automatically lock strategic doors to isolate the attacker, preventing movement through the facility. Lockdown Protocols: Procedures for evacuation or moving people to safety are automatically initiated.

This proactivity drastically shortens reaction time, leaving an attacker with minimal room to act while simultaneously providing life-saving seconds to those inside the building. The reaction time compared to traditional methods is dramatically reduced.

Versatility and Application

Due to the versatility and adaptability of this platform, its application is possible in almost any place where large numbers of people gather or where there is a need for property protection:

Educational Institutions and Public Places: Schools must be the safest places in the world. By implementing The Mercury AI detection in schools, malls, and stadiums, we raise the level of security to a standard generations before us could not have imagined. Transport Hubs: Airports, bus terminals, and railway stations are the “lifeblood” of every city, but also potential targets. The Mercury AI system enhances the security of key points without slowing down passenger flow. Critical Infrastructure: Administrative centers and energy facilities require a special level of protection. The Mercury AI detection ensures that vital state systems remain intact and safe from external threats. Business Sector: Workspaces are where we spend half our day. Protecting employees from potential threats is not just a legal obligation, but an ethical imperative for every modern employer.

The Future is Proactive

The time when we relied solely on luck or post-incident reaction is behind us. The future has arrived. The digital shield offered by The Mercury AI is not just a technological novelty—it is a necessary evolution in preserving human lives and property. Investing in such a system is an investment in the peace of mind of parents, the safety of workers, and the stability of the entire community.

We at The Mercury AI team leave nothing to chance. We do not gamble with security; we raise safety to the maximum level enabled by technology and provide an environment truly dedicated to preserving vital interests and values. That is why we work daily on implementing new solutions and keeping pace with the latest technologies—all so our clients can fully relax and not worry so much about security, knowing the digital shield is around them, protecting them.

Cyberattack Disrupts French Postal Operations as Pro-Russian Group Claims Responsibility

France’s national postal service, La Poste, experienced a significant disruption to its digital infrastructure this week after a large-scale cyberattack temporarily disabled key systems during the peak holiday delivery period. A pro-Russian hacking collective later claimed responsibility for the incident, according to French authorities.

The attack, identified as a distributed denial-of-service (DDoS) operation, forced central IT systems offline on Monday, preventing postal employees from tracking parcels and causing interruptions to online payment services linked to La Poste’s banking division. As of Wednesday morning, parts of the system had not yet been fully restored.

Responsibility for the attack was claimed by the hacker group Noname057, which has previously been linked to a series of cyber operations targeting European institutions. Following the claim, France’s domestic intelligence service, DGSI, assumed control of the investigation, the Paris prosecutor’s office confirmed.

The disruption comes at a critical time for La Poste, which handles billions of mail items and parcels annually and employs more than 200,000 people nationwide. The outage coincided with one of the busiest logistics periods of the year, amplifying its operational impact.

French authorities view the incident within a broader pattern of hostile cyber activity attributed to Russia-aligned actors. France and its European partners argue that such attacks form part of a wider “hybrid warfare” strategy aimed at destabilizing public services, exhausting security resources, and weakening political support for Ukraine. In recent years, European investigators have documented hundreds of similar incidents involving cyberattacks, disinformation campaigns, and acts of sabotage across the region.

SoundCloud Confirms Cyberattack, User Data Partially Compromised

SoundCloud has confirmed it was the target of a cyberattack in which hackers gained unauthorized access to data belonging to approximately 20% of the platform’s users. The company said the incident was detected after suspicious activity was identified within an ancillary administrative system, prompting the immediate activation of internal incident response protocols. An investigation carried out with the support of external cybersecurity experts found that the attackers accessed a limited set of data, including email addresses and information already visible on public user profiles.

SoundCloud emphasized that sensitive information such as passwords or financial data was not exposed. Nevertheless, users have been advised to remain vigilant for potential phishing attempts that could follow the incident. With the platform estimated to have more than 100 million users, the breach could affect tens of millions of accounts.

The company stated that the attackers have been removed from its systems, although the platform subsequently faced DDoS attacks, two of which temporarily disrupted the web version of the service. Issues with VPN access reported by users in recent days were linked to security-related configuration changes introduced in response to the incident, and SoundCloud said it is actively working to resolve those problems.

Major Cloudflare Outage Temporarily Disrupts Internet Worldwide

A large portion of the global internet experienced significant slowdowns today after Cloudflare, one of the key infrastructure providers behind thousands of popular websites, suffered a major technical outage. The disruption affected numerous online services — including X (formerly Twitter), Substack, Canva and others — with users encountering a “500 internal server error” message instead of the expected content.

Interestingly, some platforms that were impacted by a similar worldwide outage earlier this month remained stable this time, likely because they have since reduced their reliance on Cloudflare’s infrastructure. Among those unaffected was ChatGPT.

This is the second major incident in less than three weeks, once again highlighting the complexity and vulnerability of the global internet ecosystem. Cloudflare provides essential services that act as a “bridge” between websites and their users, accelerating page loading and protecting sites from overload. As a result, any disruption within Cloudflare’s systems can quickly trigger a chain reaction that brings down numerous unrelated services across the internet.

Although the interruption was relatively brief, it underscored how dependent the global digital landscape has become on a handful of key technology providers — and how their technical issues can instantly become a worldwide problem.

 

Germany Launches Major NIS2 and DORA Offensive: The Strictest Era of Cyber Compliance Begins for Companies

At the end of November 2025, Germany initiated the most far-reaching cybersecurity reform of the past decade, following the Bundesrat’s adoption of the NIS2 implementation law. As a result, regulatory obligations effectively entered into force immediately, without any transitional periods — a development legal experts are calling a “compliance shock” for the business sector. At the same time, European supervisory authorities activated a key mechanism of the DORA regulation and published the first list of critical IT third-party providers, who now fall under direct EU oversight.

The Federal Network Agency (BNetzA) has already presented a draft of a new security catalogue, introducing stricter requirements for safeguarding the telecommunications supply chain. The law firm Dentons reminds that all obligations apply the moment the law takes effect, including mandatory registration with the BSI and the implementation of comprehensive cyber risk-management measures. The scope of regulated entities is expanding dramatically — from around 4,500 to almost 30,000 companies — now including logistics, food supply, and digital service providers.

DORA further tightens supervision over cloud providers, analytics companies, and software vendors serving the financial sector, introducing mandatory on-site inspections and new channels for reporting IT incidents. The common priority of both regulations is strengthened third-party risk management, meaning that suppliers can no longer rely on simple declarations of conformity but must provide evidence of their security reliability.

Regulators stress that the era of postponements is over, and companies that were counting on extended deadlines now face severe penalties and increased personal liability for management. All indicators suggest that the period leading into early 2026 will be a race to close compliance gaps across all sectors.

Amazon blames Iran for combining cyber espionage with physical attacks

Amazon has released details on two cases in which Iranian threat actors combined digital espionage with physical attacks, a practice the company refers to as “cyber-enabled kinetic targeting.” The first case involves the group Imperial Kitten (also known as Tortoiseshell), linked to Iran’s IRGC, which over a two-year period progressed from cyber reconnaissance to a physical strike. According to Amazon, the group compromised a ship’s AIS system in December 2021 and, by August 2022, had gained access to additional maritime platforms and onboard CCTV cameras to collect real-time visual intelligence. In January 2024, they searched AIS location data for a specific vessel, which just days later, on February 1, became the target of a Houthi missile attack. Amazon says the link between the cyber reconnaissance and the subsequent strike is “unmistakable,” even though the attack itself was unsuccessful.

The second case concerns MuddyWater, a group tied to Iran’s MOIS, which in May 2025 prepared a server for cyber operations and, by June 17, used the same infrastructure to access a compromised CCTV server streaming live footage from Jerusalem. Researchers believe the footage was used to support the planning of a June 23 missile attack, after which Israeli authorities warned citizens to immediately disconnect internet-exposed cameras. Amazon stresses that existing terms such as “cyber-kinetic operations” or “hybrid warfare” lack precision, and proposes a new definition for campaigns where cyber activities directly support physical strikes. The company warns that this type of operation will become increasingly common as nation-states recognize the strategic advantage of combining digital reconnaissance with kinetic attacks.

Amazon urges companies to adjust their security strategies and expand threat models, noting that even entities that previously considered themselves uninteresting to attackers may now be targeted for tactical intelligence collection.

Dubai Launches “Scan Smart” Campaign to Combat QR Code Fraud

The Dubai Electronic Security Center (DESC) launched the “Scan Smart” campaign, which took place from 24 to 30 October as part of Cybersecurity Awareness Month, with the goal of raising public awareness about QR code–related risks. As QR codes become increasingly common in restaurants, hotels, shops, events, and other public spaces, the risk of tampering or malicious replacement continues to grow. In the first half of 2025 alone, more than 4.2 million global attempts to forge QR codes were recorded, underscoring the urgent need for public education. Through the initiative, DESC aimed to empower citizens and businesses to recognize legitimate codes, avoid compromised ones, and report suspicious activity.

DESC Chief Executive H.E. Yousuf AlShaibani stated that the campaign reflects the center’s commitment to building a safer digital environment for Dubai’s residents and visitors. As part of the campaign, DESC introduced interactive kiosks and an educational microsite, along with RZAM — a free browser extension that detects risky websites triggered after scanning QR codes.

Dozens of F&B venues across the city participated as “Scan Smart Partners,” displaying branded materials and offering visitors free coffee and exclusive discounts. These partners helped create everyday “micro hubs” of digital awareness, where the public could learn about safe QR scanning in a relaxed environment. DESC encouraged users to always verify QR codes before scanning and to report any suspicious attempts, strengthening community cyber resilience and supporting the wider vision of a safer digital ecosystem in the UAE.

Google sues operators of the “Lighthouse” phishing platform that targeted millions of users

According to the cybersecuritynews.com portal, Google has filed a lawsuit against a criminal operation known as “Lighthouse,” a sophisticated phishing-as-a-service platform that has reportedly affected more than one million people across over 120 countries. Google’s security researchers determined that this is one of the most damaging scam networks in recent years, structured to exploit well-known brand identities in order to deceive victims.

The platform enables attackers to launch large-scale “smishing” campaigns — phishing attacks delivered via SMS messages instead of email. Fraudsters impersonate companies such as E-Z Pass, USPS, and other toll service providers, sending links that direct victims to fraudulent websites. These websites are designed to look legitimate, tricking users into revealing passwords, financial information, and other sensitive data.

Google analysts uncovered at least 107 malicious website templates featuring Google’s branding on fake login screens, further increasing the risk of credential theft. In the United States, the operation has, according to the same source, facilitated the theft of data from tens of millions of credit cards, resulting in a massive financial impact.

Google’s lawsuit cites multiple laws, including RICO, the Lanham Act, and the Computer Fraud and Abuse Act. At the same time, the company is implementing additional security measures — from AI-powered systems that detect suspicious messages to enhanced account recovery options — to help users regain control of compromised accounts more quickly and safely.

How Synology Strengthens Cybersecurity and Business Continuity

Every business today faces the same two challenges: keeping data safe from relentless cyberattacks and ensuring operations never stop, even when hardware fails. Synology addresses both by delivering a platform where storage, security, and support are tightly integrated — designed to work seamlessly together from day one.

Solving the cybersecurity problem

Rapid protection against threats – Security updates and patches are delivered across the entire platform without delay, closing vulnerabilities before attackers can exploit them. Resilient by design – Built-in ransomware safeguards, end-to-end encryption, and advanced backup options come standard, helping businesses secure critical data without relying on third-party add-ons.

Download free security checklist HERE

Unified control – IT teams manage everything from a single interface, reducing complexity and eliminating the blind spots that attackers often target in fragmented environments.

Ensuring business continuity

Optimized performance – Because hardware and software are built to complement each other, systems run more reliably, with fewer disruptions.

Express replacement for Plus Series – If a device fails, Synology provides fast replacement for all HDD-based Plus models, minimizing downtime and keeping data accessible when it’s needed most. Predictable lifecycle – Businesses can plan long-term with confidence, knowing their infrastructure is supported, secure, and future-ready.

Why it matters for every business

Small companies – The same powerful DSM operating system runs on entry-level devices as on enterprise models. That means even the smallest businesses get access to enterprise-grade tools like encrypted backups, centralized management, and secure file sharing — all without the overhead of a large IT department.

Medium-sized businesses – As workloads grow, Synology scales effortlessly. High-performance storage, SSD caching, and expansion units allow companies to support more users, heavier applications, and larger datasets without compromising speed or reliability. Security policies and monitoring remain centralized, keeping complexity low while performance stays high.

Large organizations – Enterprises with global operations gain consistency and resilience. Solutions like ActiveProtect extend Synology’s protection across remote offices and data centers, covering massive workloads and ensuring unified recovery strategies worldwide. Every branch runs on the same hardened DSM platform, making compliance, monitoring, and threat response faster and more effective.

With Synology, businesses don’t just store data — they safeguard it against threats and guarantee access, no matter what. It’s cybersecurity and business continuity, built into the foundation of their infrastructure.

WhatsApp fixes security flaw in iOS and macOS apps

WhatsApp has released fixes for a critical vulnerability in its iOS and macOS apps that may have been exploited in targeted attacks. The flaw, tracked as CVE-2025-55177, stemmed from insufficient authorization in linked device synchronization and was discovered by WhatsApp’s internal security team. Meta said the bug could have allowed attackers to process malicious content from arbitrary URLs on a victim’s device.
The issue affected WhatsApp for iOS before version 2.25.21.73, WhatsApp Business for iOS 2.25.21.78, and WhatsApp for Mac 2.25.21.78, all patched in late July and early August. Researchers believe the weakness may have been chained with CVE-2025-43300, a zero-day in Apple’s ImageIO framework that was recently exploited to target individuals.

Amnesty International reported that WhatsApp has alerted certain users who may have been targeted in spyware campaigns over the past three months. The company advised affected individuals to perform a full device reset and ensure their operating system and apps remain updated. “This is a classic example of a zero-click attack, where no user interaction is needed to compromise a device,” said Donncha Ó Cearbhaill, head of Amnesty International’s Security Lab. He warned that this spyware continues to pose serious risks to journalists, activists, and human rights defenders.