Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Falcon Exposure Management Network Vulnerability Assessment: Demo Drill Down

CrowdStrike Falcon Exposure Management simplifies network security with its Network Vulnerability Assessment, offering a modern way to secure network infrastructure without complex legacy tools. Learn how the system utilizes your existing Falcon sensors to provide unmatched continuous visibility-instantly correlating new threats against your assets—and leverage authenticated scanning for deeper, more complete vulnerability inspection.

Intel Chat: TruffleNet exploit, React Native vulnerability, SesameOp OpenAI & SkyCloak [265]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

November 10, 2025 Cyber Threat Intelligence Briefing

Microsoft’s DART team identified a new backdoor named SESAMEOP in July 2025 that uses the OpenAI Assistants API as its command and control (C2) channel. Proofpoint has detailed a campaign targeting freight and trucking companies using remote monitoring and management (RMM) tools to steal cargo. Security researchers at Catchify identified a critical unauthenticated remote code execution vulnerability in the UniFi Access backup/export workflow, tracked as CVE-2025-52665, with a CVSS score of 10.0 (critical).

If AI Security were food...What's on the menu? #aisecurity #food

How do you explain AI Security without the jargon? Easy you make it food. In this video, we asked leading AI Security professionals to describe AI Security as a dish. Their answers turn complex ideas like prompt injection, data leaks, and model hardening into bite-sized insights you’ll actually remember. From layered lasagna to spicy tacos, each response brings a fresh perspective on what it means to build and protect secure AI systems.

Securing Omnichannel Consumers | Nishith Datta (Head of Cybersecurity - Titan)

In this episode of Guardians of the Enterprise, Nishith Datta (Head of Cybersecurity & InfoSec, Titan Group) shares his experience securing large-scale systems such as Aadhaar, the world’s largest digital identity programme, and his involvement in national cybersecurity initiatives that required protection at massive scale.

How Insurity and Reach Built a Living Zero Trust Model - with Jay Wilson & Garrett Hamilton

Would you rather run a network where everyone trusts everything, or one where nothing moves without being continuously verified? Most would agree that the most secure is ideal. The real question is: how do you get there, and by what means? And where is "there"? That’s the spectrum of Zero Trust maturity most organizations find themselves navigating—from implicit trust and flat networks to real-time validation and least-privilege access that adjusts as environments change.