Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Malware Analysis - 2025 MITRE ATT&CK Enterprise Evaluations

The 2025 MITRE ATT&CK Enterprise Evaluations challenged defenders with sophisticated malware analysis scenarios, and CrowdStrike delivered 100% detection and protection with zero false positives. Traditional malware analysis takes hours or days, but modern threats like Mustang Panda require instant answers: What does this file do? What family does it belong to?

CVE-2025-66516: Critical XXE Vulnerability Exposes Apache Tika Deployments

A critical XXE vulnerability, CVE-2025-66516, has been discovered in Apache Tika, putting any workflow that processes PDFs at serious risk. A malicious PDF can trigger the exploit through any Tika workflow, silently giving attackers access to sensitive files, internal URLs, cloud metadata, and your internal network. AppTrana blocks these malicious PDFs at the edge, keeping your data and internal systems secure.

How Insurity Cut Manual Security Work by 81%

95 hours back. Every. Single. Month. One of the many outcomes from our ZTA journey with Insurity. They didn’t just deploy Zero Trust — they operationalized it. Reach unified controls, automated remediation, and eliminated the manual effort slowing progress. Results:︎ 81% less manual work︎ 95 hours saved per employee per month︎ Months → days for rollout︎ Zero Trust that sticks.

How to Configure and Manage miniOrange 2FA for Bitbucket | Admin & User Setup

This tutorial provides a complete walkthrough of configuring and managing Two-Factor Authentication (2FA) in the miniOrange 2FA app for Bitbucket. Learn how admins can enable and enforce 2FA methods across users and groups, and see how end users complete their 2FA setup during login. Strengthen your Bitbucket security with an additional authentication layer and protect your instance from unauthorized access.

AI, Creators & Agentic Commerce - A Conversation with Cloudflare CSO Stephanie Cohen

In this episode of This Week in NET, host João Tomé sits down with Stephanie Cohen, Cloudflare’s Chief Strategy Officer, for a candid conversation about AI, content creators, financial services, partnerships, and the future of the Internet. Stephanie shares how Cloudflare is helping keep the Internet open and resilient — from giving creators transparency and control over AI scraping, to enabling new models of agentic commerce through partnerships with Visa and Mastercard, to empowering organizations of all sizes through Cloudflare’s global network.

Why most SOCs are failing (and how to fix them) with Alec Fenton from Foresite Cybersecurity [274]

On this episode of The Cybersecurity Defenders Podcast we speak with Alec Fenton, VP of Security Operations at Foresite Cybersecurity about his journey from SOC analyst to security leader. Alec Fenton is a seasoned Cyber Security professional with over 15 years of extensive experience across many IT domains. With a career spanning more than a decade, Alec has honed his expertise in addressing a broad spectrum of cybersecurity challenges, leveraging his analytical prowess and hands-on approach to leadership.

Kubernetes 1.35 Security Changes: cgroup, WebSockets, Image Pull Auth + More

It’s December, and Kubernetes 1.35 is almost here - with security changes that can break workloads or access paths if you upgrade unprepared. This video is a fast, practical security edition rundown for security and platform engineers: what changed, why it matters, and what to verify before you roll 1.35 into production. In this video (Kubernetes 1.35 security highlights): If you want a deeper dive, comment with what you’re running today (managed K8s vs self-managed, distro, container runtime, auth setup) and I’ll break down the safest upgrade path.