Using CyberStash’s Eclipse.XDR to Search for IOCs
Learn how to efficiently search for threats within your environment using the Eclipse.XDR Cyber Defence platform. In this session, Sally, a cybersecurity analyst at CyberStash, demonstrates how to leverage indicators…
What does a Tesla and sophisticated malware have in common?
What does a Tesla and sophisticated malware have in common? Both are quiet, efficient, and designed with unparalleled precision. Tesla’s sleek electric vehicles redefine transportation with innovation and silence, while…
The Man in the Middle podcast: CyberStash Eclipse.XDR Cyber Defense Platform
I recently had the chance to speak at CyberCon, where I took the stage to talk about "Beyond Detection: Transforming Threat Intelligence into Actionable Attack Surface Reduction."The session was packed…
CyberCon Melbourne – November 2024: Transforming Threat Intelligence into Actionable Attack Surface Reduction
It was a privilege to present at CyberCon on "Beyond Detection: Transforming Threat Intelligence into Actionable Attack Surface Reduction." During the session, we explored the critical role of threat intelligence…
Podcast: Secrets to Operationalizing Threat Intelligence
In this episode of The Ryann Lofamia Podcast, Ryan Lofamia engages in a compelling conversation with Loris Minassian, the Founder and CEO of CyberStash, an innovative leader in the…
External Attack Surfaces in the Crosshairs: Pygmy Goat and the Shifting Cyber Threat Landscape
The Sophos XG firewall targeting in the Pacific Rim campaign, and the use of malware like Pygmy Goat, underscores a broader and highly significant issue: the management of the external…
How Small and Medium Businesses in Australia Can Avoid Common Cybersecurity Mistakes
In today's digital landscape, small and medium businesses in Australia are increasingly becoming targets for cyber criminals. These malicious actors often perceive small and medium enterprises as easy prey, exploiting…
The Fall of Constantinople: A Lesson in Cybersecurity Preparedness
On May 29, 1453, the city of Constantinople, once a bastion of Christian power and the capital of the Byzantine Empire, fell to the relentless assault of Sultan Mehmet II…
Don’t You Just Love Those Pesky Cybersecurity Folks?
Let’s face it: cybersecurity professionals can feel like the uninvited guests at a party. You know the type—always asking for more resources, pushing for that new license, and waving the…
Stay Safe Online with CyberStash Advanced Cybersecurity Solutions
In today's digital age, cyber security is more important than ever. Businesses of all sizes are at risk of cyber-attacks, which can have devastating consequences. CyberStash is a leading Australian…
Keeping Your Business Safe in the Digital Age: Cyber Security Solutions from CyberStash
In today's ever-evolving digital landscape, cyber security has become an essential concern for businesses of all sizes in Australia. With the constant rise of cyber threats, it's crucial to have…