Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2025-59287: Critical WSUS Vulnerability Exploited in the Wild

Microsoft disclosed CVE-2025-59287 , a critical, unauthenticated RCE in Windows Server Update Services (WSUS) that lets attackers execute SYSTEM-level code via unsafe deserialization. In this video we break down how the exploit works, which servers are at risk, and real-world attack activity observed after the PoC went public.

Silence of the Daemons: Why Evasion Isn't About Location and NDR's Role in the Cloud

In this talk, David Burkett, Cloud Security Researcher at Corelight, highlights how timeless evasion tactics create critical blind spots in cloud workloads, and illustrates the role of Network Detection and Response (NDR) as a resilient countermeasure. Presented on October 30, 2025 for Datadog Detect.

The Goldilocks Approach: Finding Detections That Are Just Right

In this talk, Megan Roddie-Fonseca, Sr. Security Engineer at Datadog, addresses the challenge of finding "just right" detections, leveraging data classification techniques like recall and precision to balance false positives and missed attacks. Presented on October 30, 2025 for Datadog Detect.

Stay SEBI-Compliant: Strengthen Your Security with AppTrana WAAP

Are you prepared for SEBI’s latest cybersecurity mandates? In this video, discover how AppTrana WAAP helps financial institutions effortlessly meet SEBI cybersecurity compliance requirements. From continuous vulnerability scanning and managed WAF protection to real-time threat detection and compliance reporting, AppTrana ensures your applications stay secure and compliant at all times.

ASM Turning Awareness into Actionable Defense || Sedara October Cyber Bytes Webinar by Julian

Watch the final session of Sedara’s October Cyber Bytes 2025 series — ASM: Turning Awareness into Actionable Defense with Julian Anjorin. In this webinar, Julian explores the importance of Attack Surface Management (ASM) as a foundational layer of any security program. Learn how understanding your organization’s full digital footprint helps identify blind spots, reduce exposure, and strengthen overall security posture.