Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

BlackLock Ransomware: What You Need To Know

BlackLock is a relatively new ransomware group. First seen in March 2024, the ransomware operation initially operated under the name El Dorado, before rebranding as BlackLock late last year. BlackLock follows a RaaS (ransomware-as-a-service) business model, leasing its tools and infrastructure to affiliates who launch attacks, sharing a proportion of the proceeds with BlackLock.

How to Effectively Train Your Employees on Cybersecurity

Welcome to the Data Security Decoded podcast. In this episode, our host, Richard Cassidy, is joined by Carolin Desirée Toepfer, founder of Cyttraction and CISO as a Service for multiple organizations across Europe and North America. Carolin shares her journey from building websites and online communities to becoming a cybersecurity leader, offering insights into the unique challenges of European cybersecurity, AI security frameworks, and transforming cybersecurity training into data integrity training that better aligns with business needs.

Cybersecurity Essentials for Startups

Launching a startup is an exciting venture. From conducting market research to defining your value proposition and developing a solid business plan, laying the groundwork for your business requires careful planning and diligence. Another key factor to consider is funding. Whether through investors, crowdfunding, or alternative financing options like private loans, securing adequate capital is essential for success.

How Attackers Use AI To Spread Malware On GitHub

Github Copilot became the subject of critical security concerns, mainly because of jailbreak vulnerabilities that allow attackers to modify the tool’s behavior. Two attack vectors – Affirmation Jailbreak and Proxy Hijack – lead to malicious code generation and unauthorized access to premium AI models. But that’s not all. Contents hide 1 Jailbreaking GitHub Copilot 1.1 Affirmation jailbreak? “Sure,” let’s exploit the AI system(s) 2 Proxy Hijack.

When Security Fails: Be READY | Former Federal CIO Warning

"Something's going to happen." Maria Roat, former Deputy Federal CIO, delivers a wake-up call about the inevitable nature of security incidents. In this crucial clip from Data Security Decoded, Maria reveals why response preparation is everything and how to minimize damage when (not if) breaches occur. Don't wait until "all your data went out the door" - learn proactive strategies from a federal tech leader who's seen it all!

Security is NOT a Tech Problem: It's BUSINESS | CIO Reveals Board-Level Truth

Aysha Khan, CIO & CISO at Treasure Data, drops a truth bomb: "Security isn't a tech problem—it's a BUSINESS problem." In this eye-opening clip from, Aysha explains why cybersecurity deserves a seat at the board table and how empowering your CISO creates true organizational resilience. Listen to the full episode to discover why your security strategy might be fundamentally flawed!

What is Turbo Threat Hunting?

Rapid, reliable has never been so easy. Keep your business moving forward at lightning speed with Turbo Threat Hunting. With the ability to proactively scan 75,000 backups in less than 60 seconds, you can recover and get back up to speed in record time. Time is money, especially when it comes to recovering and getting your business back up and running!