Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Amit Malik gives you an inside look at new attack methods being used by adversaries

Attackers are using AI and LLMs in unique ways to increase their capabilities and minimize their footprint; so how can defenders respond? Don’t miss this episode of Data Security Decoded with Amit Malik, a Staff Security Researcher at Rubrik Zero Labs, who gives you an inside look at new attack methods being used by adversaries. Get Data Security Decoded wherever you listen to your podcasts, or subscribe to our channel!

The Network Blind Spot Adversaries Exploit

Did you know there may be a blind spot in your network right now? Firewalls, routers, and edge devices often generate minimal logs by default, creating visibility gaps that adversaries can exploit. In this breakdown, we examine how a China-nexus threat group known as Operator Panda leveraged vulnerable network devices to gain access, establish persistence, and remain undetected even after patches were applied.

Outpacing Modern Adversaries with the CrowdStrike Agentic SOC

Adversaries are weaponizing AI, accelerating tradecraft and moving from access to impact at machine speed. As breakout times collapse to seconds, security teams cannot rely on manual processes or static automation to keep up. Meet the CrowdStrike Agentic SOC, a new operating model built for the AI era.

Notepad++ Supply Chain Attack Explained | CrowdStrike OverWatch Identified It Months Early

Your next software update could be weaponized. In this short breakdown, we examine how adversaries compromised the Notepad++ update mechanism to distribute malware and how CrowdStrike identified the activity four months before public disclosure.

Protecting Remote Endpoints: Backup Best Practices for a Distributed Workforce | BDRShield Webinar

YouTube Description With remote and hybrid work becoming the new normal, laptops and desktops are now the most vulnerable — and most overlooked — layer of business data protection. In this practical webinar, the BDRShield by Vembu team explains how IT teams and MSPs can protect remote endpoints reliably without disrupting users or increasing operational complexity. Speakers: Mani Subramanian Product Manager, Vembu Technologies What You’ll Learn.

From Chaos to Clarity: Your Guide to Understanding and Identifying CUI

The webinar "From Chaos to Clarity: Your Guide to Understanding and Identifying CUI" focused on controlled unclassified information (CUI) and its importance for government contractors. Megan Kennett, from Neosystems, hosted the session, which featured experts Reagan Edens, Jim Goebel, and David Carlino. The panel discussed the basics of CUI, including its definition, types, and the lifecycle approach to managing it. They emphasized the need for contractors to understand their contractual obligations and the authorized flow of CUI.