Scams are closing in. Don't get trapped. Avast Free Antivirus with intelligent online scam detection and real-time protection against the latest malware and scams.
After four sessions covering the technical realities, business imperatives, and security challenges of agentic AI, Salt Security’s Co-Founder and CEO Roey Eliyahu, and Salt's CMO Michael Callahan, come together for an unfiltered conversation about where the industry actually stands and where it's headed. The gap between AI ambition and operational readiness has never been wider.
A critical Erlang SSH vulnerability (CVE-2025-32433), also known as Chainbreaker, allows attackers to exploit pre-auth SSH behavior for remote code execution. In this video, we break down exactly what security teams need to do — from immediate mitigation to long-term prevention. What you’ll learn in this video: How to mitigate CVE-2025-32433 by upgrading Erlang OTP (27.3.3 / 26.2.5.11 / 25.3.2.20)
Join us for a detailed review of the Admin Portal navigation update. We will outline the implemented changes, the design rationale, and the feature roadmap. Participate in a live Q&A to submit your feedback and get your implementation inquiries addressed by our team.
Agentic AI and Shadow APIs: Why SecOps Needs Specialization Now APIs are rapidly becoming the core “language” of AI, and when agentic AI can generate its own APIs, the security stakes rise significantly. In this clip from the A10 Networks discussion, “APIs are the Language of AI – Protecting Them is Critical,” A10 security experts Jamison Utter and Carlo Alpuerto unpack why specialized skills and tools are now essential for modern security operations teams.
Watch the first episode of CISO Global's podcast, "Black Hat News," with host CEO David Jemmett. In this episode, David sits down with Jeremy Pease, CEO of Hivelocity.
A critical stored XSS vulnerability (CVE-2025-10573) in Ivanti Endpoint Manager lets attackers poison the admin dashboard with malicious scripts, leading to session hijacking and device compromise. AppTrana blocks these malicious scan submissions at the edge, preventing stored XSS payloads from ever reaching the EPM dashboard, even before patching.
Many sensitive documents don’t fit cleanly into standard categories, and traditional approaches like regex or broad classifiers often create noise and false positives. In this video, we walk through how to use Nightfall’s prompt-based file classifiers to detect business-critical documents based on intent, not brittle patterns or custom model tuning.
Before investing in new security tools, it’s critical to understand what your current stack is actually delivering. Barmak Meftah spoke about the importance of baselining existing investments to truly grasp risk acceptance versus real risk exposure. Without that foundation, new acquisitions lack context and are often driven by trends rather than necessity. Smarter decisions come from understanding:︎ What is already deployed︎ How it is configured︎ Where exposure persists.
On this episode of The Cybersecurity Defenders Podcast we speak with Rebekah Skeete, Executive Director and CEO of BlackGirlsHack Foundation. Rebekah dives into how BGH is helping to increase diversity in cybersecurity by bridging the gap between what is taught in educational institutions and what is necessary for careers in cybersecurity.