

Stay ahead in cyber
Knowledge Hub
We love to share our knowledge to help you prevent cyber breaches. Deepen your skills in cybersecurity and stay updated with real-world insights, tools, and resources from our experts.
Cybersecurity Insights
Latest Insights


Critical CVE-2025-24434 Vulnerability in Adobe Commerce and Magento Open Source

Meet Jonas Wendrup, Head of IT Security and Operations at Lund municipality

Law Enforcement disrupts Major Spam Delivery Service

The New DeepSeek R1 AI Platform

Critical Vulnerability Alert: SonicWall SMA1000 Exploited

New WDAC Exploit Technique: Leveraging Policies to Disable EDRs and Evade Detection

Critical Authentication Bypass Vulnerability in FortiOS and FortiProxy

The Crucial Role of Intune Configuration Management
Cybersecurity webinars
Boost your knowledge

SMB Cybersecurity and the Cyber Risks of the Supply Chain

Enterprise Cybersecurity and AI: Beyond Ransomware

Navigate the Threat Landscape – Cybersecurity for Swedish Businesses

Threat Intelligence Report 2025 – Key Highlights

The Synergy of EDR and NDR/XDR for a Modern Security Posture

Introduction and Key Components of MDR

The Current Cybersecurity Threat Landscape

Who is Protecting Your Identities? Don’t Wait For Breach…

Emergency EDR Deployment: Secure Your Entire Infrastructure in Hours
Explore our Events
Cybersecurity Events

Cybersecurity Summit 2025 Online

Next Level Threat Landscape – Breakfast Seminar

Cybersecurity Summit 2025 Copenhagen

Cybersecurity Summit 2025 Stockholm

Cybersecurity Summit 2025 Umeå

Technical Talk Community Night – AAD Graph API Pitfalls

Technical Talk Community Night – End 2024 in Style and Step into 2025 with Energy!

Truesec Infrastructure Summit Express Ed. 2024

Truesec Connect 2025
Guides
Check out our guides
Reports
Download our Reports

Threat Intelligence Report 2025

Threat Intelligence Report 2024

Threat Intelligence Report 2023

Anonymous Sudan: Threat Intelligence Report

Public Sector Report

Swedish Energy Sector Report

Swedish Manufacturing Industry Report

Threats to the Swedish financial sector in 2021

Threat Intelligence Report 2022
Truesec News
Latest news

Truesec Releases 2025 Threat Intelligence Report: Cyber Trends and Threats

Truesec Acquires Foresights, a Specialist in Cyber Security Advisory and Intelligence

Truesec and NetClean Announce Strategic Partnership

Truesec Launches MDR Black – A New Cybersecurity Solution

Truesec lanserar MDR Black – en ny cybersäkerhetslösning

Fredrik Nylander, New Chairman of the Board of Truesec

Fredrik Nylander, New Chairman of Truesec

Truesec – Elite Partner CrowdStrike
