This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Faculty of Computer science, The College of Service Business , Sokolac, East Sarajevo , Bosnia and Herzegovina
Faculty of Information Technologies, Alfa BK University , Belgrade , Serbia
Toplica Academy of Professional Studies, Toplica Academy of Professional Studies , Prokuplje , Serbia
Belgrade Business and Arts Academy of Applied Studies, Belgrade Business and Arts Academy of Applied Studies , Belgrade , Serbia
This paper presents an original scientific contribution through the comprehensive application of the case study methodology in analyzing the evolving cyber threats that shape information security in the 21st century. Rather than relying on a descriptive or review-based approach, the paper introduces a clear scientific structure with defined criteria for selecting case studies, a methodological framework, and a transversal analysis across different types of attacks. The objective is to provide deeper insight into the behavioral patterns of modern threat actors, identify critical vulnerabilities, and formulate recommendations that can be practically applied within organizations of all sizes. The paper includes four extended case studies based on a combination of academic literature, industry reports, and contemporary sources.
The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.