Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Malware

Phreak Out!: New Bluebox Extortion Group DLS Emerges

Another week, another extortion group data-leak site emerges. Cyjax has continued to observe the emergence of data-leak sites (DLSs) for extortion and ransomware groups. New groups FunkSec, ContFR, Argonauts, Kairos, Chort, and Termite appeared in December and November 2024 alone, bringing this year’s total up to 69. On 11 December 2024, Cyjax identified the emergence of a Tor-based DLS belonging to a new data-leak extortion group going by the name ’Bluebox’.

What are the types of malware? Common types & examples

Malware, short for malicious software, refers to any software specifically designed to harm, exploit, or otherwise compromise a device, network, or user data. In today’s digital age, malware attacks have become a persistent threat, targeting individuals, businesses, and even governments.

Healthcare's Biggest Cybersecurity Risk: Insider Threats! #shorts #podcast #cybersecurity

Maria Roat, Former Deputy Federal CIO emphasizes that, “If healthcare personnel aren’t trained, not just on threats, but insider risks—cybersecurity will always fall short.” Cybersecurity starts with people. Hear Maria’s take on why healthcare teams must lead the charge. Catch Maria's powerful insights on with Travis Rosiek. Discover: The impact of insider threats Why training healthcare teams is critical How cybersecurity saves lives.

Cybersecurity Leadership Transitions with Maria Roat, Former US Deputy Federal CIO

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.

Data Detection and Response (DDR): Stopping an Attack in its Tracks

In this episode of Into the Breach, host James Purvis dives into the cutting-edge world of Data Detection and Response (DDR) with data security expert Drew Russell. Together, they explore how DDR can halt cyberattacks in their tracks by combining autonomous asset inventory, user activity insights, and data classification for a comprehensive defense strategy.