Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Future of Threat Intelligence: Trends, Tools, and Tactics To Watch

In today’s evolving cyber landscape, threat intelligence has become a cornerstone of effective cybersecurity strategies. As cyber threats grow in sophistication and frequency, understanding emerging trends, adopting advanced tools, and implementing proactive tactics are essential for organisations aiming to safeguard their digital assets. Traditionally, threat intelligence has focused on reactive measures, analysing known threats to mitigate potential damage.

98% Spike in Phishing Campaigns Leveraging Russian (.ru) Domains

A KnowBe4 Threat Lab publication Authors: Martin Kraemer, Jeewan Singh Jalal, Anand Bodke, and James Dyer EXECUTIVE SUMMARY: We observed a 98% rise in phishing campaigns hosted on Russian (.ru) top-level domains (TLDs) from December 2024 to January 2025, primarily used for credential harvesting. These Russian.ru domains are run by so-called “bullet-proof” hosting providers, that are known to keep malicious domains running and ignore abuse reports which is ideal for cybercriminals.

Ensure Application availability with comprehensive Kubernetes Image and Containers Protection in hybrid and multi-cloud environments

We recently had a prospect that wanted to test our image and application recover capabilities, in a multi-cloud architecture. Currently they were using an internal OpenShift image registry to store their images, and they wanted/needed to migrate all their applications to a new cluster, and also wanted to use Red Hat’s quay.io to store the images from now on. This proved a very easy task for Trilio, as when we protect applications, we also protect the images.

What is risk & risk management in cyber security?

Cybersecurity risks are a constant and evolving threat. Organizations across industries face vulnerabilities from both internal and external sources, which, if not addressed, can disrupt operations, damage reputations and erode trust. And this is where a structured and comprehensive risk management strategy becomes critical. But what exactly is a risk in cyber security? And what is risk management? Keep reading and find out about essential best practices in cyber risk management.

Beyond EDR: Securing Your SaaS Attack Surface with LimaCharlie Adapters

The modern attack surface has shifted beyond endpoints to SaaS applications and cloud identities. Traditional security tools focused solely on endpoint telemetry miss sophisticated attacks that never touch the endpoint. Join Ken Westin to explore how LimaCharlie's adapters provide comprehensive visibility across your SaaS environment. We'll demonstrate collecting and analyzing telemetry from business-critical applications like 1Password and GitHub, plus newly supported platforms like HubSpot.

[Promo Video] Managed Cyber Risk Services

Protect Your Business with Managed Cyber Risk Services | SecurityScorecard Cyber threats are evolving, and your business needs proactive defense. SecurityScorecard's Managed Cyber Risk Services help organizations identify, monitor, and respond to cyber threats across their entire digital ecosystem.

The power of transparency: How a trust center can accelerate enterprise sales and build credibility

In an era of escalating cybersecurity threats, heightened regulatory scrutiny, and increased consumer awareness about data protection, businesses cannot afford to be opaque about their security and compliance practices. Enterprise clients, particularly those in regulated industries, demand visibility into the security posture of their vendors before committing to a business relationship.