Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

WatchGuard's Biannual Internet Security Report 2025 H2 - The 443 Podcast - Episode 359

This week on the podcast, we cover the WatchGuard Threat Lab's Internet Security Report for the second half of 2025. In this episode, we cover the latest trends in malware at both the network perimeter and endpoints, network attacks, and the top malicious domains from the period before, and end with some tips everyone can use to defend their networks.

Cursor Composer 1.5 is Here: Is It Actually Better?

Is Cursor’s new Composer 1.5 model a major leap forward, or just a marginal update? Today, we’re putting the latest version of Cursor’s agentic AI to the test using our "Production-Ready Note App" prompt. We compare the speed, UI design, and agentic capabilities of 1.5 against version 1.0. Most importantly, we run a full security audit using the Snyk extension to see if the AI-generated code is actually safe for production.

Webinar Stop Trusting Your AI Browser

Browser security is built around human control. AI browsers break that model. By inserting an assistant that can interpret content and act inside authenticated sessions, behaviors can be manipulated beyond what traditional defenses can detect. Security leaders need to catch this Cato CTRL Cybersecurity Masterclass to see how attackers exploit AI Browser behavior, and what defenders can do to respond.

Intel Chat: DoppelBrand, Android malware Keenadu, attackers expand AI use & AI-driven threats [295]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Claude Code Summarizes Host Activity in LimaCharlie

Watch Claude Code analyze a week of activity for a specific host in LimaCharlie. The agent resolves the correct sensor, queries recent detections, collects event telemetry, analyzes process and network behavior, and produces a concise activity profile. Security analysts can quickly understand host behavior patterns without manually reviewing raw telemetry logs.