Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

May 06, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: UK Defence Contractors Warn Staff Against Chinese EVs UK defence firms, including Lockheed Martin and Thales, have advised staff against connecting mobile phones to Chinese-made electric vehicles (EVs) due to concerns over potential espionage and data theft. These vehicles, equipped with cameras, microphones, and internet connectivity, could be exploited by hostile states to collect sensitive information.

What does it mean to be cyber resilient?

Achieving should be a priority for all! Everyone needs to pull their weight when it comes to protecting the lifeblood of your organization: your data. Let’s take a new approach to cybersecurity, one that assumes that cyber attacks WILL happen. Resilience means being ready for anything! Learn more about what it means to be truly by checking out the link in our bio.

Securing Jira: protect, audit, and recover your data with confidence

Join us for a roundtable on Jira security and its role in an organization's cyber resilience. Experts from GitProtect.io, Atlassian, Siebert Group, and SaaSJet discuss Jira backup and disaster recovery best practices Atlassian Marketplace security and compliance Issue changes visibility and its role in full compliance User anonymization and auto-processing of sensitive information.

How to Use MCP Servers with Claude Desktop | Real-Time AI Integration

In this video, I walk you through the basics of getting started with MCP servers using Claude Desktop as the client. Whether you're new to MCP servers or just looking for a smooth way to connect and explore, this step-by-step guide will help you get up and running in no time!

Ep 8: Living Off The Land

Cyber experts start getting called into electric, water, pipeline, railway, and transportation hubs around the country. Hackers have found a clever way to embed in these systems, using a small, unsuspecting device in everyday Americans’ homes. And once these hackers get in, they’re not dropping the usual malware, or sucking much of any data out. Unlike their predecessors, these hackers are very careful to cover their tracks. It appears they’re just lying in wait. Sleeper cells waiting for marching orders. So what’s the trigger? And what happens if they pull it?