Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

November 10, 2025 Cyber Threat Intelligence Briefing

Microsoft’s DART team identified a new backdoor named SESAMEOP in July 2025 that uses the OpenAI Assistants API as its command and control (C2) channel. Proofpoint has detailed a campaign targeting freight and trucking companies using remote monitoring and management (RMM) tools to steal cargo. Security researchers at Catchify identified a critical unauthenticated remote code execution vulnerability in the UniFi Access backup/export workflow, tracked as CVE-2025-52665, with a CVSS score of 10.0 (critical).

If AI Security were food...What's on the menu? #aisecurity #food

How do you explain AI Security without the jargon? Easy you make it food. In this video, we asked leading AI Security professionals to describe AI Security as a dish. Their answers turn complex ideas like prompt injection, data leaks, and model hardening into bite-sized insights you’ll actually remember. From layered lasagna to spicy tacos, each response brings a fresh perspective on what it means to build and protect secure AI systems.

Securing Omnichannel Consumers | Nishith Datta (Head of Cybersecurity - Titan)

In this episode of Guardians of the Enterprise, Nishith Datta (Head of Cybersecurity & InfoSec, Titan Group) shares his experience securing large-scale systems such as Aadhaar, the world’s largest digital identity programme, and his involvement in national cybersecurity initiatives that required protection at massive scale.

How Insurity and Reach Built a Living Zero Trust Model - with Jay Wilson & Garrett Hamilton

Would you rather run a network where everyone trusts everything, or one where nothing moves without being continuously verified? Most would agree that the most secure is ideal. The real question is: how do you get there, and by what means? And where is "there"? That’s the spectrum of Zero Trust maturity most organizations find themselves navigating—from implicit trust and flat networks to real-time validation and least-privilege access that adjusts as environments change.

Fuel the Agentic SOC with High-Fidelity Data using Falcon Onum

Power your Agentic SOC with Falcon Onum. Watch how teams eliminate data bottlenecks and move at machine speed with intelligent pipeline management—collecting, enriching, and routing high-fidelity data across the enterprise in minutes. CrowdStrike Falcon Next-Gen SIEM: Consolidate security operations with the world’s most complete AI-native SOC platform. Subscribe and Stay Updated.

Cyber Resilience in Healthcare: Insights from 2025 LevelBlue Spotlight Report

Join us for an insightful on-demand webcast exploring how healthcare organizations are strengthening cyber resilience to protect patients, safeguard data, and ensure care continuity. Based on findings from 220 healthcare cybersecurity leaders, the 2025 Spotlight Report reveals how hospitals and health systems are adapting to evolving threats, mitigating software supply chain risks, and aligning cybersecurity with clinical and business priorities.