• Cyber Safety
  • Posts
  • TAG-110 Evolves, Picus's New Feature & Cyber Insurance Crunch

TAG-110 Evolves, Picus's New Feature & Cyber Insurance Crunch

In partnership with

Network segmentation is one of the smartest ways to contain threats before they become disasters. By isolating critical assets and applying role-based access, you reduce lateral movement, improve incident response, and meet compliance needs.

  • 43% of data breaches stem from lateral movement—segmentation limits this risk by design.

  • VLANs, firewalls, and SDN enable granular control across hybrid infrastructures.

  • Effective segmentation boosts performance, simplifies audits, and helps enforce least privilege.

With ransomware and insider threats on the rise, segmentation is no longer optional—it’s foundational.

Stay up-to-date with AI

The Rundown is the most trusted AI newsletter in the world, with 1,000,000+ readers and exclusive interviews with AI leaders like Mark Zuckerberg, Demis Hassibis, Mustafa Suleyman, and more.

Their expert research team spends all day learning what’s new in AI and talking with industry experts, then distills the most important developments into one free email every morning.

Plus, complete the quiz after signing up and they’ll recommend the best AI tools, guides, and courses – tailored to your needs.

Traditional antivirus solutions are no longer sufficient in the face of evolving cyber threats. The latest trends show a staggering percentage of malware-free attacks, leading to the emergence of EDR (Endpoint Detection and Response) as a crucial defense tool. Here are some highlights:

79% of cyber attacks were malware-free in 2024.
EDR continuously monitors endpoints for unusual activity.
Zero Trust approach ensures strict access controls.
Automated responses neutralize threats in real-time.

As cybercriminals become increasingly innovative, adopting EDR technology is essential for robust cybersecurity and swift threat mitigation.

In a groundbreaking cyber-espionage campaign, the Russia-aligned group TAG-110 is targeting Tajikistan's government using weaponized Microsoft Word templates. This strategic shift highlights their evolving tactics in intelligence gathering. Key points include:

• Transition from HTA payloads to .dotm templates for stealth.
• Targeting ministries and educational institutions with fake documents.
• Innovative persistence by placing malware in the Word Startup folder.

Analysts connected TAG-110 to previous operations through code reuse and similar command-and-control mechanisms. This campaign underscores the continued threat posed by sophisticated state-aligned hacking groups in the region.

How 15 Small Brands Achieved Remarkable Marketing Results

Stop believing you need a big budget to make an impact. Our latest collection highlights 15 small brands that transformed limited resources into significant market disruption through innovative thinking.

  • Case studies revealing ingenious approaches to common marketing challenges

  • Practical tactics that delivered 900%+ ROI with minimal investment

  • Strategic frameworks for amplifying your brand without amplifying your budget

These actionable insights can be implemented immediately, regardless of your team or budget size. See how small brands are making big waves in today's market.

Hackers are targeting macOS users with deceptive Ledger apps to unleash malware that drains cryptocurrency wallets.

Key highlights include:
Evolving Tactics: Attackers now focus on stealing seed phrases, allowing them to quickly empty wallets.
Multiple Campaigns: Analysts identified four active campaigns, showcasing refined techniques to evade defenses.
Odyssey Stealer: A new malware effectively bypasses security, using convincing phishing tactics to capture user data.

These malicious efforts threaten the entire cryptocurrency ecosystem and could undermine trust in secure wallet solutions, urging users to stay vigilant against these advanced scams.

Picus Security has unveiled its innovative Exposure Validation feature, empowering security teams to tackle the overwhelming number of vulnerabilities with precision. This tool allows teams to focus on what truly matters by:

• Continuously testing defenses against real-world attack techniques.
• Providing an Exposure Score that evaluates actual threats.
• Automating real-time validation results aligned with compliance needs.

In a world where resources are stretched thin, Exposure Validation transforms vulnerability management from a reactive chore into a proactive strategy, ensuring that security efforts are both efficient and effective. Say goodbye to wasted resources and hello to smarter, evidence-based decision-making!

The cyber insurance market is booming as businesses grapple with increasing digital threats and regulatory pressures.

Market Growth: Expected to rise from $16.81 billion in 2024 to $71.8 billion by 2032, at an impressive CAGR of 19.9%.
Key Drivers: Escalating cyberattacks, regulatory compliance, and widespread digital transformation are fueling demand.
Regional Highlights: North America leads in market share, while the Asia-Pacific region shows the fastest growth.

While challenges like underwriting complexity persist, advancements in risk assessment and tailored coverage solutions present exciting opportunities for insurers. As organizations prioritize cybersecurity, the market is set for robust innovation and collaboration.