by Arjun Shailly | Oct 14, 2025 | Deep Dive
Find Threat Talks on Why Your Cyber Hygiene Matters? What happens when one person’s bad cyber hygiene puts an entire network at risk?The result can be devastating—unauthorized access, data theft, and a ripple effect that endangers not just one user, but every...
by Arjun Shailly | Sep 30, 2025 | Deep Dive
Zero Trust Step 5B: Maintain Controls Find Threat Talks on Zero Trust Step 5B: Maintaining Security Controls Breaches aren’t shocks; they’re late-stage symptoms of control decay. Drift turns “temporary” access into standing exposure and quietly erodes assurance. In...
by Arjun Shailly | Sep 23, 2025 | Deep Dive
Defend Against Hacktivist Groups like APT Handala Find Threat Talks on How To Defend Against Hacktivist Groups like APT Handala Hacktivist groups like APT Handala aren’t driven by money. They’re fueled by politics, disruption, and the desire to make headlines. In this...
by Arjun Shailly | Sep 16, 2025 | Deep Dive
Promptlock – The First AI-Powered Malware Find Threat Talks on Promptlock – The First AI-Powered Malware If malware used to be predictable, those days are gone.With AI in the driver’s seat, malware has become a shape-shifter. Promptlock is the first documented...
by Arjun Shailly | Sep 5, 2025 | Deep Dive
Data Bouncing: How HTTP Headers Leak Data Find Threat Talks on Data Bouncing: How HTTP Headers Leak Data You harden endpoints. You filter egress. You deploy malware detectors. And still, data slips out. In this Threat Talks Deep Dive, our host sits down with Luca...
by Arjun Shailly | Aug 21, 2025 | Deep Dive
Zero Trust Step 5A: Monitor and Maintain Find Threat Talks on Zero Trust step 5A: Monitor and Maintain Monitoring is often treated as an afterthought in cybersecurity, or worse, as a starting point. But without the right foundation, all those logs, alerts and SIEM...