by Arjun Shailly | Sep 5, 2025 | Deep Dive
Data Bouncing: How HTTP Headers Leak Data Find Threat Talks on Data Bouncing: How HTTP Headers Leak Data You harden endpoints. You filter egress. You deploy malware detectors. And still, data slips out. In this Threat Talks Deep Dive, our host sits down with Luca...
by Arjun Shailly | Aug 21, 2025 | Deep Dive
Zero Trust Step 5A: Monitor and Maintain Find Threat Talks on Zero Trust step 5A: Monitor and Maintain Monitoring is often treated as an afterthought in cybersecurity, or worse, as a starting point. But without the right foundation, all those logs, alerts and SIEM...
by Arjun Shailly | Aug 19, 2025 | Deep Dive
Russia’s Seashell Blizzard: Stealth Attacks to Wipers Find Threat Talks on Russia’s Seashell Blizzard: Stealth Attacks to Wipers They’ve been called Sandworm, APT 44, Iron Viking, and Electrum. But whatever the name, Seashell Blizzard is one of the most disruptive...
by Arjun Shailly | Aug 12, 2025 | Deep Dive
SignalGate: Wrong Contact, Classified Chat Leak Find Threat Talks on SignalGate: Wrong Contact, Classified Chat Leak When a group of U.S. government and military officials chose Signal to share classified information, they assumed it was a secure choice. But one...
by Arjun Shailly | Jul 15, 2025 | Deep Dive
Zero Trust Step 4B: How to Secure Admin Access Find Threat Talks on Zero Trust Step 4B: How to Secure Admin Access Admins hold the key to the proverbial kingdom – and this makes them a top target for attackers. In part B of our deep dive into step four of Zero Trust...
by Arjun Shailly | Jul 15, 2025 | Deep Dive
Mastering Step Four of Zero Trust: Policy Creation Find Threat Talks on Mastering Step Four of Zero Trust: Policy Creation Now that you’ve defined your protect surfaces, mapped your transaction flows and built your Zero Trust architecture, it’s time for step four of...