Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What We Looked for in a DSPM Solution

In this episode of Into the Breach, James Purvis speaks with Fabiano, VP of Engineering, about Rubrik’s acquisition of Laminar's Data Security Posture Management (DSPM) platform. They discuss the rigorous evaluation process of a dozen startups, what made this platform stand out, and how the acquisition has enabled Rubrik to offer the most comprehensive DSPM solution in the market. From alignment in mission to overcoming challenges, Fabiano shares insights into the integration process and the future of data security posture management.

Cybersecurity vs. Cyber Resilience: The Future of Security! #shorts #podcast #datasecurity

"Cybersecurity is a process, but cyber resilience is the outcome. It's about more than managing risk—it's ensuring your organization can withstand and recover from anything." – Kris Lovejoy Cyber resilience is the next step for organizations ready to thrive under pressure. Catch Kris’s insights on with Ghazal Asif. Discover: Why resilience matters more than ever How security fits into the bigger picture Practical steps to build resilience.

January 27, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: CL0P Update The group’s post reads as follows, "DEAR COMPANIES THIS IS THE NEXT LIST WHICH WE HAVE CLOSED FOR THE TIME BEING AND DO NOT SHOW THE NAMES IN FULL IF YOU DO NOT GET IN TOUCH ASAP THE LIST WILL BE OPEN” and continues with the listed victim organizations and ways for the companies to contact the group.

Modern Tech Old Systems on the Cloud! #shorts #datasecuritydecoded #cybersecurity #podcast

"If you don’t know what you have, you can’t secure it. And putting a 30-year-old system on the cloud doesn’t make it modern.” – Kris Lovejoy Cybersecurity starts with the basics: inventory and upgrades. Want to future-proof your business? Catch Kris’s insights on now.

Ransomware's Evolution: Key Threat Groups Targeting the Energy and Utilities Sector in 2025

Ransomware has a long history, first established in 1989 with the introduction of the AIDS Trojan, of use by criminals to force organizations and regular people to hand over money. Trustwave SpiderLabs follows the continuously changing history of ransomware and those behind the malware in Energy and Utilities Sector Deep Dive: Ransomware Threat Groups, a supplementary report to the team’s just released 2025 Trustwave Risk Radar Report: Energy and Utilities Sector.

Global Cybersecurity Needs Global Standards #shorts #podcast #datasecuritydecoded #cybersecurity

"I’m pro-regulation, but the lack of international standards makes compliance a huge challenge.” - Kris Lovejoy Cybersecurity today isn’t just about protection but navigating a fragmented regulatory landscape. Kris explains why standardization is key to resilience. Catch her insights on! Key Points: Why regulations matter Challenges of global compliance Building resilience across borders.

Trustwave SpiderLabs: The Ransomware Trends Confronting the Energy and Utilities Sector

Increasing frequency, new threat groups emerging, the rise of ransomware-as-a-service (RaaS) attack model, and third-party attacks are just a few of the dangerous trends Trustwave SpiderLabs details in Energy and Utilities Sector Deep Dive: Ransomware Trends. This report supplements the just released 2025 Trustwave Risk Radar Report: Energy and Utilities Sector. This broader and more comprehensive report analyzes the energy and utilities sector’s major threats and trends.

Inside FunkSec: An Exclusive Interview with a Ransomware Architect

Summary FunkSec is a new ransomware group that came into the spotlight after attacking many sectors around the world. The group runs a data leak site on Tor. Funksec employees conduct double extortion attacks, which means hackers encrypt and exfiltrate data from the victim to extort them for paying ransom to the attackers.

Lumma Stealer: Fake CAPTCHAs & New Techniques to Evade Detection

In January, Netskope Threat Labs observed a new malware campaign using fake CAPTCHAs to deliver Lumma Stealer. Lumma is a malware that works in the malware-as-a-service (MaaS) model and has existed since at least 2022. The campaign is global, with Netskope Threat Labs tracking victims targeted in Argentina, Colombia, the United States, the Philippines, and other countries around the world.

Malvertising Campaign Abuses Google Ads to Target Advertisers

Researchers at Malwarebytes are tracking a major malvertising campaign that’s abusing Google Ads to target individuals and businesses interested in advertising. The threat actors are using compromised Google Ads accounts to run ads that impersonate Google, leading victims to a fake Google login page designed to steal their credentials.