Welcome to Cybersecurity Monday
Cybersecurity Monday, by Truesec.

Welcome to Cybersecurity Monday

Welcome to the first edition of Truesec's LinkedIn newsletter!

On one Monday each month, we offer a digest of the latest updates and insights in the cyber landscape. Enjoy it with your morning coffee or tea, and stay ahead with expert insights from our cyber professionals.


Dissecting the Cicada

A new ransomware group calling themselves Cicada3301 was first observed in June 2024, when they posted four victims on a victim blog. Since then, Cicada3301 has added more victims to this list. The name Cicada3301 appears to be taken from an Internet cryptography game a few years ago, but there is nothing to tie this ransomware group to that phenomenon.

Nicklas Keijser, Threat Intelligence Research Analyst, and Mattias Wåhlén, Threat Intelligence Expert, have investigated and incident with this new ransomware group and can now share what their team found.

Click below to read the full article


Iranian Cyber Espionage Group Collaborate With Ransomware Groups

In a new warning from the US CISA, it is reported that a Iranian threat actor known as Lemon Sandstorm is conducting ransomware attacks in collaboration with Russian ransomware-as-a-service groups like BlackCat, NoEscape, and Ransomhouse.

Lemon Sandstorm is assessed to be a state sponsored Iranian threat actor closely linked to the Iranian cyber espionage group Peach Sandstorm, that is highly likely part of Iran’s revolutionary guard corps, IRGC.

Click below to read the full article


A Prepper's Guide for a Possible Cyberattack

On-Demand webinar

Cyber attacks happen every day – are you prepared? While no one can predict when an attack might hit, there are effective ways to minimize the impact and prevent breaches. But where do you start? Should you install every security application? Replace all your firewalls?

Mikael Nyström and Hasain Alshakarti have over 50 years of combined experience in cybersecurity and incident response. In this session they'll guide you through and help you focus on the key actions that truly make a difference.

Watch it now


Ensure Your Team is Security Vetted

Our Human Threat Intelligence team, has 100 years of combined experience from military and civilian intelligence, security, and law enforcement communities. The purpose of a security vetting operations is to assess whether a person is reliable from a security perspective. Know your people to minimize insider risks and potential data breaches.

To learn more about security vetting in cybersecurity, please click below


Cybersecurity Summit 2024

Don't miss the opportunity to join us for a full day of cybersecurity insights tailored for tech professionals. Discover the latest techniques used by cybercriminals and learn how to secure your IT environments. 

Truesec brings Cybersecurity Summit 2024 to multiple locations this year. Whether you prefer Swedish or English, we have the event for you.

Join us in three locations:

Umeå - 24/9 - Event in Swedish 🇸🇪

Stockholm - 26/9 - Event in Swedish 🇸🇪

Malmö - 1/10 - Event in English 🇺🇸

Livestream from Malmö - 1/10 - Event in English 🇺🇸

Last chance to sign up! Click on the gif for more details 👇

Article content
Join cybersecurity summit 2024 in three locations!

The Current Threat Landscape

Opportunistic attacks are on the rise.

For more insights into the current cyber threat landscape - download the Truesec 2024 Threat Intelligence Report here.

That's a Wrap

We look forward to having you back for our next edition. Want to be the first to know and get monthly insights straight to your inbox?

Sign up for our newsletter here.

To view or add a comment, sign in

Explore topics