Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why AI Agents are Next! The Death of APIs? #AI #Shorts

Why AI Agents are next is the biggest question in tech right now! In this breakdown, we look at how we're moving from static APIs to Agentic Interaction. While frameworks like MCP (Model Context Protocol) are gaining ground, the real challenge is creating a "Passport" system for AI agents from different companies to communicate securely. Key Insights: –Why AI Agents will replace traditional SaaS workflows.–The shift from deterministic APIs to dynamic agentic behavior.–The "AI Passport" – the missing piece for cross-company AI security.

Keeper 101 - How to Create Your Keeper Account on iOS

Learn how to create your Keeper Account on iOS in less than 2 minutes with our step-by-step guide. Signing up for Keeper's iOS mobile app is easy. Simply visit the App Store on your device, search for Keeper, and install “Keeper Password Manager”. Once the download is complete, tap Open to launch Keeper.

Solving the Hard Problems in Cybersecurity

We really enjoyed our conversation with Ed Amoroso from TAG Infosphere. We didn’t start Reach to chase headlines. We started it because the hard security problems weren’t getting solved. The important ones rarely are. Security only works when incentives are aligned to the customer’s actual outcome. Not noise. Not theater. Not (exclusively) shiny tools. That alignment is what makes the work worth doing.

LimaCharlie + @claude Code: Admin Tasks, MITRE Coverage, and EDR Detections [Demo]

Claude Code runs directly inside the LimaCharlie UI, connecting to the MCP server and loading the skills needed to execute commands across your environment. In this video, you'll see it in action for common administrative tasks: identifying organizations and their IDs, pulling sensor counts for a specific org, and getting a full breakdown of containers by type. SOC managers can query this information conversationally rather than navigating multiple menus or writing custom scripts.

150+ FAKE law firm websites found in AI cloning scam #cybersecurity #ai #podcast

In this week's Intel Chat, Christopher Luft and Matt Bromiley discuss how attackers used AI to clone over 150 law firm websites, targeting fraud victims under the guise of offering legal assistance to recover lost funds. Chris points out how easy this has become with AI tools. Attackers can quickly clone a website, host it at a legitimate-looking domain, and start harvesting information. The episode also covers Russian cyber operations targeting the defense industrial base, Team PCP's campaign compromising 60,000+ servers, and exposed OLAMA AI infrastructure.

Ep. 46 - Blueprint Thieves: Inside Iran's Industrial Espionage Machine

In this episode of _The Cyber Resilience Brief_, we break down the modern reality of *Iranian cyber warfare and industrial espionage*. Host Tova Dvorin and offensive security engineer Adrian Culley analyze the tactics, techniques, and procedures (TTPs) of *APT33, OilRig (APT34), and MuddyWater* — three of the most active Iranian state-sponsored threat actors targeting *energy, aviation, manufacturing, government, and critical infrastructure*.

Sophos Firewall: Configuration Viewer

An overview of the new Sophos Firewall Configuration Viewer - a standalone, browser-based tool that converts firewall configurations into a clear, human-readable format, enhancing your viewing, auditing, documentation, and comparison capabilities. All data is processed locally, so your information remains 100% private. Ask questions and get expert answers in the Sophos Community.

Flipper Zero And Dual Use Security Tools

Multi purpose devices such as Flipper Zero support security audits through radio, infrared and bluetooth testing, while also enabling garage door opens and other abuse. Some countries ban these tools outright and treat them as malicious, yet the real issue sits with intent, in the same way a weapon in the wrong hands becomes a problem. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..