Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

When your AI Assistant Becomes the Attacker's Command-and-Control

Earlier this month, Microsoft uncovered SesameOp, a new backdoor malware that abuses the OpenAI Assistants API as a covert command-and-control (C2) channel. The discovery has drawn significant attention within the cybersecurity community. Security teams can no longer focus solely on endpoint malware. Attackers are weaponizing public and legitimate AI assistant APIs and defenders must adjust.

Unlocking Microsoft E3/E5 Security: How Reach Finds Hidden Gaps and Automates Remediation

New product tour who dis Most teams aren’t getting the full value out of their Microsoft E3/E5 stack — not because the tools aren’t powerful, but because the configurations are complex, scattered, and hard to operationalize. Reach maximizes your Microsoft security investment: Interrogating your current Microsoft security configurations→ Reach evaluates the current capabilities of the existing E3/E5 environment, analyzes how the current licenses are being utilized, and identifies opportunities to leverage E5 features to enhance the organization’s security posture.

Come see us at Microsoft Ignite: Live Demos & How We Optimize Your Security Stack

We're live. Cheyenne, Walter, and Cain are giving demos, answering questions, and showing how Reach helps teams optimize their security stack. Level up your knowledge and get some loot on this side quest. Come see us: Microsoft Ignite — San Francisco Booth 4037 November 18–21, 2025.

What Is a Large Language Model (LLM)?

The history of computing is marked by sea change moments; those times when the world seems to shift into a new possibility space almost overnight. ENIAC. The personal computer. The World Wide Web. The smartphone. And now, AI. While the term “AI” has been applied to many new (or re-branded) services and products, the underlying technology that makes most of them feel like magic is the large language model (LLM).

Cloudflare Firewall for AI Explainer and Demo

AI is powerful, but without protections in place, it’s risky. In this explainer and demo, you'll learn how you can secure your AI-powered applications with Cloudflare Firewall for AI. The demo will show Firewall for AI detecting and mitigating threats like PII exposure, unsafe/toxic content, prompt injection, and jailbreak. Further, you'll see Cloudflare’s powerful analytics capability and how Cloudflare's AI agent, Cloudy, can help investigate threats and build and deploy Firewall for AI security policies.

How KnowBe4 Uses AI Efficiently to Get the Best Results

Using the right tool for the job is always better. Anyone who does DIY projects around the home knows how using the right tool can dramatically make the job you are doing far easier. Use the wrong tool, and that task suddenly becomes a burdensome nightmare. And after over 38 years in cybersecurity, I know that applies to cyber defense strategies, but I add one more axiom: Use the dumber, faster thing first for best results. Dumber things are usually faster at blocking a large number of things.

How AI offers defenders even more growth opportunities with Michael Baker from DXC Technology [269]

On this episode of The Cybersecurity Defenders Podcast we speak with Michael Baker, VP, Global Chief Information Security Officer at DXC Technology, about his optimistic outlook on the impact of AI in cybersecurity.

Apono Releases MCP Server for Admins

We’re excited to announce the launch of our MCP server for Apono administrators — giving security and DevOps teams the ability to surface complex access data instantly, without the endless API queries, spreadsheets, or manual digging that slows everyone down. Admins are the guardians of access. But when they need answers like “Which users are included in this access flow?” or “Who has access to production?”, getting that data today can take hours.