ОтложитьЧитал
00
добавлено 2024-09-15 12:27:00
This part discusses the benefits and potential drawbacks of advisories issued by agencies like CISA and NSA, highlightin...
ОтложитьЧитал
00
добавлено 2024-09-14 12:23:41
This part outlines various mitigations and best practices recommended by CISA to strengthen cloud security, including th...
ОтложитьЧитал
00
добавлено 2024-09-13 12:21:44
This part emphasizes the importance of basic cybersecurity practices, such as regular audits, secure password management...
ОтложитьЧитал
00
добавлено 2024-09-12 12:22:34
This part examines the sophistication and adaptability of cyber actors in their efforts to compromise cloud infrastructu...
ОтложитьЧитал
00
добавлено 2024-09-11 12:39:20
This part explores the use of service and dormant accounts by cyber actors to gain access to cloud environments, highlig...
ОтложитьЧитал
00
добавлено 2024-09-11 12:39:18
This content provides an in-depth analysis of the cyber insurance market, which has seen significant growth and challeng...
ОтложитьЧитал
00
добавлено 2024-09-10 13:03:08
This chapter outlines the benefits of cyber insurance for businesses, including financial protection, risk management su...
ОтложитьЧитал
00
добавлено 2024-09-10 13:02:02
This part discusses how cyber actors are expanding their targeting to include a broader range of cloud services and acco...
ОтложитьЧитал
00
добавлено 2024-09-09 13:03:58
This part emphasizes the critical role of initial access in cloud security, highlighting how cyber actors focus on gaini...
ОтложитьЧитал
00
добавлено 2024-09-09 13:03:50
This chapter discusses how businesses and insurers are adapting to the rapidly changing cyber landscape. It highlights t...
ОтложитьЧитал
00
добавлено 2024-09-08 13:00:48
This part explains how cyber actors use stolen access tokens and other authentication methods to bypass traditional pass...
ОтложитьЧитал
00
добавлено 2024-09-08 13:00:21
This chapter explores the key factors driving the growth of the cyber insurance market, including increased cybercrime, ...
ОтложитьЧитал
00
добавлено 2024-09-07 13:00:35
This chapter offers predictions for the future of the cyber insurance market, considering factors such as technological ...
ОтложитьЧитал
00
добавлено 2024-09-07 12:59:34
This part provides a detailed look at the tactics, techniques, and procedures (TTPs) used by cyber actors to gain initia...
ОтложитьЧитал
00
добавлено 2024-09-06 13:17:25
This chapter provides a comprehensive overview of cyber risks specific to different industries. It discusses the unique ...
ОтложитьЧитал
00
добавлено 2024-09-06 13:17:25
This part details how cyber actors are adapting their tactics to exploit cloud services, blending in with legitimate tra...
ОтложитьЧитал
00
добавлено 2024-09-05 13:01:05
This chapter highlights industries that generally face lower cyber risks, such as agriculture and construction. It expla...
ОтложитьЧитал
00
добавлено 2024-09-05 13:01:04
This part presents key findings from recent advisories on how cyber actors are adapting their tactics to target cloud in...
ОтложитьЧитал
00
добавлено 2024-09-04 13:04:15
This chapter identifies industries that are particularly vulnerable to cyberattacks, such as healthcare, finance, and ma...
ОтложитьЧитал
00
добавлено 2024-09-04 13:04:00
This part explores the evolving tactics and techniques used by cyber actors to gain initial access to cloud environments...
ОтложитьЧитал
00
добавлено 2024-09-03 13:01:01
This part discusses the various methods cyber actors use to attack cloud services, highlighting the vulnerabilities and ...
ОтложитьЧитал
00
добавлено 2024-09-03 13:00:37
This chapter discusses the common exclusions found in cyber insurance policies, such as acts of war, insider threats, an...
ОтложитьЧитал
00
добавлено 2024-09-03 09:38:57
В десятом выпуске второго сезона мы обсуждаем, как инвесторы оценивают IT-стартапы, как запитчить свой проект и какие тр...
ОтложитьЧитал
00
добавлено 2024-09-02 12:54:04
This chapter outlines the types of cyberattacks typically covered by cyber insurance policies, such as ransomware, phish...
ОтложитьЧитал
00
добавлено 2024-09-02 12:53:32
Discusses the risks associated with leaving default settings unchanged on Ubiquiti EdgeRouters, which can be easily expl...
ОтложитьЧитал
00
добавлено 2024-09-01 12:58:06
Suggests that the tactics and techniques outlined in the MITRE ATT&CK framework are frequently applicable to Ubiquiti ro...
ОтложитьЧитал
00
добавлено 2024-09-01 12:57:59
This chapter delves into the differences in cyber insurance premiums based on various factors, including company size, i...
ОтложитьЧитал
00
добавлено 2024-08-31 12:50:06
Highlights the presence of multiple malware threats targeting Ubiquiti routers, such as MASEPIE, underscoring the need f...
ОтложитьЧитал
00
добавлено 2024-08-31 12:50:03
This chapter identifies and discusses the major challenges facing the cyber insurance market, such as the difficulty in ...
ОтложитьЧитал
00
добавлено 2024-08-30 12:51:09
Points to the unintended use of Ubiquiti routers for proxying and tunneling, which can be exploited by attackers to mask...
ОтложитьЧитал
00
добавлено 2024-08-30 12:50:16
This chapter provides a detailed analysis of cyber insurance premiums across different industries. It highlights which s...
ОтложитьЧитал
00
добавлено 2024-08-29 12:50:22
This chapter examines the factors driving the increased demand for cyber insurance, including the rise in cyberattacks, ...
ОтложитьЧитал
00
добавлено 2024-08-29 12:50:07
Refers to a specific vulnerability (CVE-2023-23397) affecting Ubiquiti routers, which attackers can repeatedly exploit i...
ОтложитьЧитал
00
добавлено 2024-08-28 12:48:48
This chapter analyzes the changes in cyber insurance premiums over the past year, noting a general trend of decreasing r...
ОтложитьЧитал
00
добавлено 2024-08-28 12:48:45
Suggests that Ubiquiti routers may have weaknesses that make it easier for attackers to steal user credentials, highligh...
ОтложитьЧитал
00
добавлено 2024-08-27 12:52:09
This chapter reviews the significant changes in the cyber insurance market over the past year. It covers the stabilizati...
ОтложитьЧитал
00
добавлено 2024-08-27 12:52:08
This chapter explores the latest trends in the cyber insurance market, including the increasing demand for coverage, the...
ОтложитьЧитал
00
добавлено 2024-08-27 12:52:06
This chapter compares and contrasts liability insurance with cyber insurance, explaining their different scopes and cove...
ОтложитьЧитал
00
добавлено 2024-08-27 12:52:04
This chapter provides an in-depth analysis of the current state of the cyber insurance market, highlighting key factors ...
ОтложитьЧитал
00
добавлено 2024-08-27 12:52:02
In recent years, Russia has embarked on a path of digital sovereignty, driven by a combination of geopolitical tensions,...