Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why You Can't Defend Against Prompt Injection

Prompt injection works because language models struggle to tell the difference between trusted instructions and untrusted user content. Unlike SQL injection or cross site scripting, there is no clean deterministic defence, which leaves code, libraries and AI workflows open to manipulation at multiple points.

Hunting Supply Chain Attacks with Jared Myers, Director, CrowdStrike OverWatch

Supply chain attacks targeting AI have recently been making headlines — and keeping the CrowdStrike OverWatch team busy. Jared Myers, director of CrowdStrike OverWatch, joins Adam in this episode to discuss his team’s approach to detecting and responding to these attacks.

Accelerating Detection and Response: Cato + CrowdStrike

Security teams are under constant pressure to detect issues quickly and respond with confidence. When endpoint and network data sit in separate systems, investigations take longer and important context can be missed. In this short demo, you will see how Cato SASE Cloud and CrowdStrike Falcon work together. Falcon endpoint telemetry feeds directly into Cato’s XOps engine, where it is correlated with network activity to create guided security stories.

DarkSword: Known Threats. Known Protection. Complete Visibility.

In moments. No warning. No trace. Total takeover. In March 2026, a new breed of mobile threat emerged: DarkSword. This sophisticated iOS exploit chain doesn’t need a phishing link or a malicious app download. Just one visit to a compromised website is enough to expose your entire enterprise. In this video, we dissect the DarkSword attack path—from the initial Safari iframe encounter to the kernel-level takeover—and show you how the threat disappears before most security teams even know it’s there.

What Is a Computer Virus? How It Spreads & How to Stop It | Avast

You use your computer every day to work, shop, stream, and connect with the people and things you care about. But what exactly is a computer virus, and how does it manage to spread so fast? In this video, we explain what a computer virus is, how it attaches to files and programs you trust, and how it activates, copies itself, and spreads to other files and devices—just like a biological virus.

Ultra-low Latency Performance | A10 Networks vs Competitors

In high-frequency trading, staying competitive means matching or beating the speed of the competition. A10's ultra-low latency appliance achieves 1.4µs latency and remains consistent even while enabling FiX-aware routing. See the difference. Please note, performance is based on microseconds but scaled to seconds for visualisation purposes.

Secret Scanning For AI Coding Tools With ggshield

Introducing ggshield AI hooks from GitGuardian to help stop AI coding assistants from leaking secrets. See how ggshield can scan prompts, tool calls, file reads, MCP calls, and tool output inside AI coding tools like Cursor, Claude Code, and VS Code with GitHub Copilot. When a secret is detected, ggshield can block the action before sensitive data is sent or exposed. You will also see how simple the setup is, with flexible install options for local or global use. This adds practical guardrails to AI-assisted development and helps teams move fast without increasing secret sprawl.