Cybersecurity Monday #6
Truesec

Cybersecurity Monday #6

It's Monday, and Truesec is back with our first Cybersecurity Monday newsletter of the year!

On one Monday each month, we offer a digest of the latest updates and insights in the cyber landscape.

In this edition, you'll find our newly released annual Threat Intelligence Report, expert insights, and details on upcoming events. Grab your morning coffee or tea, and let’s dive in!


Truesec Threat Intelligence Report 2025

Our annual Threat Intelligence Report is based on the data, statistics, and research from Truesec’s extensive experience preventing breaches and minimizing impact from breaches. In this report we’ll help you understand what challenges we see in the cyber threat landscape and what you can do to mitigate the risk of breach.

Download your copy today—click below!


Webinar: Enterprise Cybersecurity and AI: Beyond Ransomware

What happens when the threats against an environment go silent? When all our defenses are built to detect and protect against malicious activities, and the threat actors just don’t get caught in our tripwires? Is AI our biggest threat or savior? Or has it simply not come into its own yet?

 In this webinar, you will learn about:

  • Beyond Ransomware: Preparing for a different type of threat.
  • AI in Cybersecurity: Has or will AI transform cybersecurity?

February 19 at 09:00 (CET).

Click below to sign up!


The Crucial Role of Intune Configuration Management

In today's digital landscape, effective configuration management is essential. Microsoft Intune simplifies managing and securing devices, applications, and data. This post highlights how well Intune configuration streamlines IT operations and boosts cybersecurity.

Click below to read the article!


Webinar: SMB Cybersecurity and the Cyber Risks of the Supply Chain

98% of Nordic businesses are SMBs, often facing limited resources to manage cyber threats. How should organizations with limited resources manage the risks of cyber threats? Join our webinar to explore trends, best practices, and strategies for improving cybersecurity and addressing supply chain attacks.

March 13 at 13:00 (CET).

Click below to sign up!


New WDAC exploit technique: Leveraging Policies to Disable EDRs and Evade Detection

Truesec has received information from internal threat intelligence sources regarding a new technique involving threat actors using Windows Defender Application Control (WDAC) to push their own malicious policies.

Click below to read the article!


Microsoft 365 Security Boost

In this lecture-style class developed and presented by Marcus Pettersson (Principal Consultant) and Daniel Chronlund (Principal Consultant), you'll learn how to protect and defend identities, devices, and data using the latest features in Microsoft 365.

Click below to read more and sign up!


That’s a Wrap for This Time..

We hope you enjoyed it and look forward to having you back for our next edition. Want to be the first to know and get monthly insights straight to your inbox?

Sign up for our newsletter here.

Great stuff! We will bring this to the morning coffee @ the office 🧑🚀

Like
Reply

To view or add a comment, sign in

Others also viewed

Explore topics