Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Minimum Viable Hospital: Protecting Patient Care When Everything Is Offline

In this episode of Building Cyber Resilience: A Healthcare Leader’s Guide, host Josh Howell sits down with Dr. Sam Bhatia, Medical Director for Innovation in Microsoft’s Health & Life Sciences division. With a career that spans clinical practice, pathology-focused informatics, and global technology leadership, Dr. Bhatia brings a rare dual perspective on how hospitals can protect patient care when core systems fail. He breaks down how to define the Minimum Viable Hospital, why clinicians must shape recovery priorities, and how hybrid downtime models powered by AI can help health systems navigate the next decade of cyber disruptions.

Dawn Cappelli on the global threat environment

The gloves are off: the threat environment has escalated! Global conflicts have led to a surge in cyberattacks targeting critical infrastructure. Tune in to the latest episode of the Data Security Decoded podcast for a fantastic conversation with Dawn Cappelli that covers rising global tensions, the rapidly evolving threat landscape, and how to secure OT environments from bad actors. Subscribe to our channel and never miss an episode!

How Rubrik Zero Labs Uses LLMs to Analyze Malware at Machine Speed with Amit Malik

AI is changing how malware is built, and how it’s caught. In this episode, Caleb Tolin is joined by Amit Malik, Staff Security Researcher at Rubrik Zero Labs, to unpack how large language models are transforming malware analysis, enabling defenders to sift through thousands of samples and surface truly novel threats. From Chameleon malware abusing WSL to AI-generated attack code, this conversation explores what real data resilience looks like in an AI-driven threat landscape.

Ransomware, Bitcoin And Harsh Crypto Reality

An estimated ninety eight percent of ransoms use cryptocurrency, with Bitcoin at the centre, which turns it into core infrastructure for extortion and fraud. The discussion questions positive impact, pointing to energy waste, slow transactions, fixed supply design and the likelihood of central banks adopting similar tech without those flaws.

Rondodox Botnet: Understanding a Low-Visibility Cyber Threat

Rondodox is a botnet that operates quietly and causes damage over time. It does not flood networks with traffic or trigger obvious alerts. It continues to run in the background for extended periods without being detected. In most cases, botnets are found when something breaks, but Rondodox is different. It blends into normal activity and relies on low-noise communication. This is why detecting this botnet is difficult, even in environments with mature security tools.

What Hackers Know About Fileless Malware (And You Should Too)

Fileless malware doesn't rely on flashy exploits or obvious downloads, which is exactly why it works so well. Instead, it slips into systems quietly, using tools that already belong there. That makes it harder to notice and easier to underestimate. If you think security threats always arrive as suspicious files, you're already behind. Understanding how fileless attacks operate helps you spot warning signs earlier and adjust defenses before real damage starts.

UNO reverse card: stealing cookies from cookie stealers

Criminal infrastructure often fails for the same reasons it succeeds: it is rushed, reused, and poorly secured. In the case of StealC, the thin line between attacker and victim turned out to be highly exploitable. StealC is an infostealer malware that has been circulating since early 2023, sold under a Malware-as-a-Service (MaaS) model and marketed to threat actors seeking to steal cookies, passwords, and other sensitive data from infected computers.

Operation Repo Ruse

BlueVoyant Security Operations Center (SOC) and Threat Fusion Cell (TFC) researchers identified an active campaign by the prolific threat actor Rift Brigantine (a.k.a. TA505, FIN11, and Graceful Spider). In this iteration, the actor is leveraging fraudulent GitHub repositories to distribute malicious batch script installers masquerading as legitimate IT and security software, including Microsoft Remote Desktop Connection Manager (RDCMan) and Palo Alto Networks GlobalProtect.

Start Where You Are: Resilience in Healthcare Begins With Action

In this episode of Building Cyber Resilience: A Healthcare Leader’s Guide, Josh Howell, Healthcare CTO at Rubrik, sits down with Heather Costa, Director of Technology Resilience at Mayo Clinic and Vice President at WiCyS Healthcare. Heather breaks down what it takes to build real resilience inside complex healthcare systems where downtime carries human consequences. She shares practical frameworks for prioritization, overcoming analysis paralysis, and aligning leadership around what matters when every minute counts.