Cyber Security Byte: Saturday, January 25th, 2025

catch yourself before you fall

This week, we’re putting a spotlight on ThreatLocker, our newest Affiliate Partner. Known for their cutting-edge endpoint security solutions - including application whitelisting and storage control - ThreatLocker is at the forefront of enabling organizations to embrace Zero Trust strategies.

Looking to deepen your Zero Trust expertise? Mark your calendars for Zero Trust World 2025, hosted by ThreatLocker in Orlando. This hands-on cybersecurity conference offers actionable insights, peer networking, and up to 40 CPE credits - all designed to help leaders like you stay ahead of evolving threats.

🔍 Key Headlines

  • Ransomware Surge Alert: Cyberattacks hit record highs in late 2024, with December marking one of the busiest months ever.

  • Malware in Disguise: New hacking campaigns embed malicious code in image files. Are your defenses prepared?

🚨 Strategic Insights

  • Hotel Breach Exposes 7.8 TB: Otelier’s massive data breach revealed sensitive guest information from several major brands.

  • Homeland Security Shake-Up: During her confirmation hearing, Kristi Noem criticized CISA’s role in combating disinformation, calling for a leaner approach.

P.S. Found us through a friend or stumbled upon us on socials? Subscribe here!💥

FEATURED

Study Reveals Cyberattacks Surged in the Final Months of 2024

The final months of 2024 marked a troubling escalation in ransomware and cyber extortion, with December setting a record as one of the busiest months for attacks ever.

This surge correlates with the growing sophistication and reach of cybercriminal groups, as detailed in a recent report. The research analyzes the tactics employed by these groups, the industries they target, and the increasing urgency for stronger defenses.

By Ryan Uliss ● Contributing Writer ● Read More…

CYBER BYTES

Two ongoing hacking campaigns have been identified that embed malicious code within seemingly harmless image files inside of emails, bypassing traditional file scanning systems.

During her confirmation hearing for Secretary of Homeland Security, South Dakota Governor Kristi Noem criticized CISA, advocating for a reduced scope and a more agile approach

Otelier's recent data breach has exposed 7.8 TB of sensitive guest data from major hotel brands like Marriott, Hilton, and Hyatt, taken from their Amazon S3 cloud storage.

TRENDING

Blurring Lines: The Symbiotic Relationship Between Physical and Cyber Security

The boundaries between physical security and cybersecurity are fading rapidly in our digital age. This convergence is reshaping the safety world and necessitates a dual-pronged approach for businesses.

With the increasing number of devices connected to the internet, threats have expanded from the virtual world into our physical space.

By Jason Edwards, Contributing CISO ● Read More…

RESOURCE HUB

$200 Off Zero Trust World 2025 Registration

Join Zero Trust World 2025 in Orlando - 2025’s premier hands-on cybersecurity event! Earn up to 40 CPE credits and master Zero Trust strategies.

Use code ZTWTNCR25 at checkout to save $200 on registration. Don’t miss this opportunity to learn, network, and grow. Register today!

A MESSAGE FROM YOUR TNCR CREW

Amplifying the Voice of the CISO

Subscribers make it possible for your TNCR Crew to curate the latest in technology thought-leadership. To support our work and get unlimited access to our award-winning coverage, subscribe today.

Copyright ©

Notifications are important to maintain a community that Connects, Collaborates, and Contributes. If you need assistance changing your unsubscribe, please let us know, and we will be happy to assist.