Stay ahead in cyber
Knowledge Hub

News update
Threat Intelligence update
Anonymous Sudan - a Threat Intelligence Report
Truesec has investigated the threat actor group to shed light on its activities and help identify its true motives.
Download report
Report
Actionable insights and advice
Threat Intelligence Report 2023
Not surprisingly, cybercrime has reached an all-time high. What we have seen, however, is a shift in tactics: Cybercriminals are becoming more and more efficient at exploiting vulnerabilities to gain access to environments. Download the report to gain actionable insight into the evolving cyber threat landscape, and advise on prioritizing your cybersecurity efforts in the coming year.
Download report
Blog
Cyber Threat Update
Increased Risk of DDoS Attacks Against Sweden
Recently, many DDoS attacks have been carried out against Swedish companies and authorities. What does the increased risk of being affected mean and how can you as an organization prepare and protect yourself against DDoS attacks?
Read more
Article
Your 5-step list
5 Hygiene Hacks for IT: Reduce the Risk of Ransomware
Don't listen to the vendors; you don't need to invest in a lot of new products to be safe from ransomware. Here is your 5-step list of actions that will drastically improve your cyber resilience – by mostly using functionality you already have.
Read more
Blog
Threat intelligence in practice
Understanding the Value and Use of Threat Profiles
The "Truesec Threat Intelligence Report" is aimed at many consumers. In this blog post we delve into "the next step,” or more specifically, your organization’s threat profile.
Read more
Training
Online training
M365 Security Boost
In this lecture-style class developed and presented by Marcus Pettersson, Senior Consultant at Truesec, you will learn how to protect and defend identities, devices, and data using the latest features in Microsoft 365.
Book now
Blog
Harden your infrastructure
Secure Your VMware ESXi Hosts Against Ransomware
The increase in ransomware targeting VMware vSphere ESXi hosts and encrypting all virtual machines calls for countermeasures. You can secure your ESXi hosts from ransomware execution by following three simple steps.
Read how