Monday 2/10
AI vs. AI: What Attackers Know Could Hurt You (Abnormal Security)
AI is pushing the envelope for hackers and other bad actors, but it's also giving security professionals a powerful new weapon. In 2025, the biggest threat will be to organisations that ignore the writing on the wall and continue to pour resources into solutions that are no match for AI-driven attacks.
https://abnormalsecurity.com/blog/ai-vs-ai-attackers-could-hurt-you
Reimagining Your SOC: Overcoming Alert Fatigue with AI-Led Investigations (Darktrace)
Human cybersecurity professionals excel in areas that require critical thinking, strategic planning, and nuanced decision-making. With alert fatigue minimized and investigations streamlined, your analysts can avoid the tedious data collection and analysis stages and instead focus on critical decision-making tasks such as implementing recovery actions and performing threat hunting.
https://darktrace.com/blog/reimagining-your-soc-overcoming-alert-fatigue-with-ai-led-investigations
Tuesday 2/11
Outpacing Ransomware: Proactive Prevention Strategies (Adlumin)
By implementing proactive cybersecurity measures, organizations can significantly reduce the impact of ransomware attacks. Regular data backups, employee training, and robust security protocols are essential in preventing and mitigating ransomware threats.
https://adlumin.com/post/outpacing-ransomware-proactive-prevention-strategies/
Identity security risk management: A practical guide (Delinea)
By understanding potential business consequences of a successful identity-related attack, you can prioritize resources and increase your cyber resilience.
https://delinea.com/blog/identity-security-risk-management
Wednesday 2/12
Caught in the Act: CrowdStrike’s New ML-Powered LDAP Reconnaissance Detections (CrowdStrike)
By applying machine learning to the challenge of signature mapping, CrowdStrike is able to address the scale, adaptability and precision challenges that limit existing approaches to detecting LDAP reconnaissance.
https://www.crowdstrike.com/en-us/blog/inside-crowdstrike-ml-powered-ldap-reconnaissance-detections/
Understanding Account Takeovers (Arctic Wolf)
While account takeover (ATO) attacks have traditionally been limited to email, the rise of software-as-a-service (SaaS) applications, cloud infrastructure, and remote connectivity tools have greatly expanded the identity attack surface, giving rise to a growing number and types of accounts a threat actor can potentially access.
https://arcticwolf.com/resources/blog/understanding-account-takeovers/
Thursday 2/13
January 2025’s Most Wanted Malware: FakeUpdates Continues to Dominate (Check Point)
A recent investigation by security researchers revealed that an affiliate of RansomHub utilized a Python-based backdoor to maintain persistent access and deploy ransomware across various networks. Installed shortly after FakeUpdates gained initial access, this backdoor demonstrated advanced obfuscation techniques along with AI-assisted coding patterns.
https://blog.checkpoint.com/research/january-2025s-most-wanted-malware-fakeupdates-continues-to-dominate-2/
What is mobile device management (MDM)? (Nerdio)
Mobile devices are essential, but they also create vulnerabilities. MDM helps businesses defend against threats, ensuring data stays secure and devices remain compliant with regulations. It’s a must-have for protecting company networks in an increasingly mobile workplace.
https://getnerdio.com/resources/what-is-mdm/
Friday 2/14
Web-Based AI Agents: Unveiling the Emerging Insider Threat (CyberArk)
While enterprise automation has already transformed workflows, these new AI agents promise even more significant advancements. However, they bring a host of security concerns and AI risk management that need immediate attention.
https://www.cyberark.com/resources/blog/web-based-ai-agents-unveiling-the-emerging-insider-threat
AI in Cybersecurity: the Good, the Bad and the Ugly (Proofpoint)
AI in cybersecurity offers immense promise. But it also requires expertise to deploy effectively. The Proofpoint Nexus AI Framework balances advanced technology with practical application.
https://www.proofpoint.com/us/blog/email-and-cloud-threats/ai-cybersecurity-revolutionizing-protection-strategies