Monday 5/12
6 Customer-proven Best Practices for Cyber-resilient Backup and Recovery (Pure Storage)
From the 3-2-1-1-0 framework to indelible data to faster threat detection, cyber resilience best practices can help organizations safeguard their operations and recover quickly and confidently when the worst happens.
https://blog.purestorage.com/perspectives/6-customer-proven-best-practices-for-cyber-resilient-backup-and-recovery/
April 2025 Malware Spotlight: FakeUpdates Dominates as Multi-Stage Campaigns Blend Commodity Malware with Stealth (Check Point)
This month, researchers uncovered a sophisticated, multi-stage malware campaign delivering some of the most prevalent commodity malware—AgentTesla, Remcos, and XLoader—via stealthy techniques designed to evade detection. Meanwhile, FakeUpdates retains its top spot in the malware rankings, impacting 6% of organizations globally.
https://blog.checkpoint.com/research/april-2025-malware-spotlight-fakeupdates-dominates-as-multi-stage-campaigns-blend-commodity-malware-with-stealth/
Tuesday 5/13
CIS Safeguard 3.10: Encrypt Sensitive Data in Transit
https://www.gothamtg.com/blog/cis-safeguard-310-encrypt-sensitive-data-in-transit
Email Attacks Drive Record Cybercrime Losses in 2024 (Proofpoint)
Last year, total losses reached $16.6 billion, which is a 33% increase from the previous year. Email continues to be the most exploited attack vector, with cybercriminals using it for phishing scams, business email compromise (BEC) attacks and data exfiltration at scale.
https://www.proofpoint.com/us/blog/email-and-cloud-threats/email-attacks-drive-record-cybercrime-losses-2024
Defending Against Business Email Compromise (Arctic Wolf)
As threat actors have evolved their tactics over time, BEC attacks have subsequently expanded in scope. Now, in addition to ATO attacks, business email compromise includes several types of email-based scams.
https://arcticwolf.com/resources/blog/defending-against-business-email-compromise/
Wednesday 5/14
Citrix and Nutanix team up to simplify virtual desktop management (Citrix)
The integration of Citrix Virtual Apps and Desktops and Citrix Desktops as a Service (DaaS) with Nutanix Prism Central on AHV simplifies operations across virtual desktop environments, offering the tools needed to broaden VDI and secure application delivery environments. With a centralized management model, IT teams can scale as needed and operate more efficiently as a whole.
https://www.citrix.com/blogs/2025/05/07/citrix-and-nutanix-team-up-to-simplify-virtual-desktop-management/
8 common questions about moving to a new Windows version (Nerdio)
Using Windows 10 after its EOL may seem appealing, but the risks are significant. Without official security updates, devices running Windows 10 will become vulnerable to cyberattacks, leaving your virtual desktop infrastructure (VDI) exposed.
https://getnerdio.com/resources/8-common-questions-about-moving-to-a-new-windows-version/
Thursday 5/15
Fort Pulaski
As defenders, relying on the past is a dangerous way to predict the future. Innovation, it seems, tends to favor the attacker.
https://www.gothamtg.com/blog/fort-pulaski
Securing generative AI: A strategic framework for security leaders (Delinea)
Securing GenAI isn’t a one-time fix—it’s a steady, evolving process. The right framework helps leaders stay focused, prioritize the right actions, and mature their security posture over time.
https://delinea.com/blog/how-to-secure-generative-ai
How to deploy a VM with IGEL Managed Hypervisor in four simple steps (IGEL)
The process is very simple; create a VM on an OS12.6.1 or later endpoint, capture the disk image, create a profile in UMS to deploy the disk image to a target OS12.6.1 or later endpoint, then you can remotely manage OS12 and the VM from UMS.
https://www.igel.com/blog/how-to-deploy-a-vm-with-igel-managed-hypervisor-in-four-simple-steps/
Friday 5/16
Your Cyber Resilience Wish List for 2025—and How to Achieve It (Pure Storage)
Mounting cybersecurity threats are putting IT teams under increased pressure. Taking a holistic approach to cyber resilience can help your organization be ready and keep running smoothly in the event of an attack.
https://blog.purestorage.com/perspectives/your-cyber-resilience-wish-list-for-2025-and-how-to-achieve-it/
Closing the Gaps in Dev Workflows: RPAs as the Missing Automation Layer (Island)
Island makes it easy to update and deliver robotic process automations (RPAs) to whole teams. RPAs live in a central management console, and upgrade with a single click. Admins enable an RPA on a policy rule, and the change rolls out instantly.
https://www.island.io/blog/closing-the-gaps-in-dev-workflows-rpas-as-the-missing-automation-layer