Incident Response

Creek Meets CTEM Paddle, Death-Breaches-Taxes, Lazarus's New Sidekick, Digital Sleight of Hand, Google's AI Defense, and Levelling the Jurisdictional Landscape. It's CISO Intelligence for Wednesday 19th February 2025.

Creek Meets CTEM Paddle, Death-Breaches-Taxes, Lazarus's New Sidekick, Digital Sleight of Hand, Google's AI Defense, and Levelling the Jurisdictional Landscape. It's CISO Intelligence for Wednesday 19th February 2025.

Today's topics: CTEM is the new lifeboat, cyber incidents are now an inevitable part of the digital world, Lazarus keeps rising and this time they brought a friend, digital laundering: a whole new magic trick, Google's new AI star player, and compliance is not an option.
Read More
Group Policies Breached, Hissy Fitting Hackers, Digital Threat Detectives Hard at Work, Cancer Care Sabotage, India's Banking "Safe Space", and Zombie Malware? It's CISO Intelligence for Monday 10th February 2025.

Group Policies Breached, Hissy Fitting Hackers, Digital Threat Detectives Hard at Work, Cancer Care Sabotage, India's Banking "Safe Space", and Zombie Malware? It's CISO Intelligence for Monday 10th February 2025.

The "one policy" format has become somewhat less precious, the black hats are pouting, cyber sleuthing is now a full-time job, cancer doesn't take a break when NHS systems are breached, India has ramped up its banking protections, and proud malware bandits?
Read More
WordPress Whacked, the UK Says No, Talking About Regeneration, Turbo-Charged MicroSoft Password Hackers, Solara's Expensive Phishing Oops, and SimpleHelp's Huge Holes. It's CISO Intelligence for Friday 17th January 2025

WordPress Whacked, the UK Says No, Talking About Regeneration, Turbo-Charged MicroSoft Password Hackers, Solara's Expensive Phishing Oops, and SimpleHelp's Huge Holes. It's CISO Intelligence for Friday 17th January 2025

Today's topics: the WordPress infiltration danger, the UK refusing ransomware extortion payouts, HexaLocker upscaling, MS vs the newest high-speed password hacking toy, the painful cost of not reinforcing cyber defenses, and remote support access tools needing to plug their own holes.
Read More