Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DarkSword: Known Threats. Known Protection. Complete Visibility.

In moments. No warning. No trace. Total takeover. In March 2026, a new breed of mobile threat emerged: DarkSword. This sophisticated iOS exploit chain doesn’t need a phishing link or a malicious app download. Just one visit to a compromised website is enough to expose your entire enterprise. In this video, we dissect the DarkSword attack path—from the initial Safari iframe encounter to the kernel-level takeover—and show you how the threat disappears before most security teams even know it’s there.

What Is a Computer Virus? How It Spreads & How to Stop It | Avast

You use your computer every day to work, shop, stream, and connect with the people and things you care about. But what exactly is a computer virus, and how does it manage to spread so fast? In this video, we explain what a computer virus is, how it attaches to files and programs you trust, and how it activates, copies itself, and spreads to other files and devices—just like a biological virus.

Ultra-low Latency Performance | A10 Networks vs Competitors

In high-frequency trading, staying competitive means matching or beating the speed of the competition. A10's ultra-low latency appliance achieves 1.4µs latency and remains consistent even while enabling FiX-aware routing. See the difference. Please note, performance is based on microseconds but scaled to seconds for visualisation purposes.

Secret Scanning For AI Coding Tools With ggshield

Introducing ggshield AI hooks from GitGuardian to help stop AI coding assistants from leaking secrets. See how ggshield can scan prompts, tool calls, file reads, MCP calls, and tool output inside AI coding tools like Cursor, Claude Code, and VS Code with GitHub Copilot. When a secret is detected, ggshield can block the action before sensitive data is sent or exposed. You will also see how simple the setup is, with flexible install options for local or global use. This adds practical guardrails to AI-assisted development and helps teams move fast without increasing secret sprawl.

Stop Drowning in Container CVE Alerts: Reachable Risk & Docker VEX with Mend.io

Developers are often overwhelmed by thousands of container CVE alerts, most of which are unfixable base image noise. This walk-through covers how to use reachable risk factors and Docker VEX statements within the Mend.io platform to streamline your vulnerability management.

Public infrastructure protection depends on analysts with Mike Hamilton, PISCES International [308]

Michael Hamilton, Chief Technology Officer at PISCES International, joins us to discuss the benefits of providing real world experience to students while they protect existing public infrastructure. The resilient future of local government security rests in our ability to adapt to changing threats and adopt new technologies, including AI.

Full SOC Operations with Claude Code: Fork, Install and Run Agents

After RSAC, one thing was clear: security teams don't want a black box AI SOC product and they want to go beyond triage and co-pilots. They want infrastructure they can control, extend, and own. LimaCharlie runs composable AI agents built on real SecOps infrastructure, in production. Our open-source AI triage agents are designed as self-contained, installable units, each with defined scope, permissions, and behavior. Join Maxime Lamothe-Brassard, CEO and Founder, as he walks through the architecture and runs live demonstrations inside the Agentic SecOps Workspace.

Ep. 53 - The Dragon's Shadow: China's Silent Cyber War Has Already Begun

What if the next cyberattack doesn’t steal your data…but quietly prepares to break your infrastructure? In this premiere episode of our series on Chinese threat actors, we uncover how China transformed from noisy, smash-and-grab hackers into the world’s most sophisticated cyber power—one focused not just on espionage, but on pre-positioning inside critical infrastructure. Through a chilling real-world scenario, we explore a new kind of threat: digital landmines—subtle, invisible changes inside power grids, telecommunications networks, and industrial systems that can be triggered at any time.