Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

GitHub Spark vs. Replit - Vibe Code Challenge

We pit GitHub Spark (in public preview) against Replit's AI agent. The challenge? Build a fully functional community forum for DIY tips from a single prompt. We compare design aesthetics, mobile responsiveness, login security, and deployment speed to see which tool creates a truly production-ready application. Which one do you think deserved the win? Let me know in the comments!

The US Ban on Foreign Routers - The 443 Podcast - Episode 364

This week on the podcast, we discuss the US government's ban on foreign-manufactured consumer routers and its likely impact. After that, we cover a research post from Huntress on a recent phishing campaign leveraging OAuth Device Authentication flows to retain long-term access to compromised accounts. We end with a review of key takeaways from Google's Cloud Threat Horizons report for H1 2026.

Cyberattacks tied to conflict in Iran, open source exploit & AI espionage / Intel Chat [#306]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Why Incident Response Fails (And It's Not the Technology)

Incident response plans rarely fail because of technology. It’s usually because of coordination, or the lack of. Nelson Carreira explains why organizations that build isolated recovery environments should use them not only for recovery testing but also to strengthen incident response planning. Simulation exercises reveal a critical need: clear roles, leadership authority, and secure communication channels during a crisis.

The Future of Cybersecurity in the Agentic World | George Kurtz and Dan Ives

In his conversation with Dan Ives, Wedbush’s Global Head of Technology Research, CrowdStrike CEO and founder George Kurtz explains why security, visibility and guardrails are the key to unlocking enterprise AI adoption - and why customers are looking to CrowdStrike to help them move faster. Subscribe and stay updated!

Securing OpenClaw Access So It Can't Go Rogue

In this video, we demonstrate how to securely grant an AI agent (OpenClaw) access to Teleport-protected Kubernetes resources using Teleport Machine Identity and tbot, without exposing secrets, API keys, or long-lived tokens. You’ll see how Teleport treats AI agents as first-class identities, enforcing strict RBAC controls so the agent can only do what it’s allowed to do, like reading logs, while being blocked from sensitive actions like deleting resources or accessing secrets.

Session on Ghost in the Machine: Attacking Non-Human Identities in the Age of AI Agents

In this eye-opening talk - DEF CON Pune (DCG-9120) held at Indira Group of Institutes, Mr. Kalpesh Hiran, VP of Technology at miniOrange, exposes the hidden dangers of Non-Human Identities (NHIs) - the API keys, service accounts, OAuth tokens, and AI agents powering your infrastructure. He spoke on organizations create 92 NHIs for every human user, Yet 97% are over-privileged, lack MFA, and linger as "orphans" post-project, fueling 80% of cloud breaches.

SecurityScorecard's Weekly Brief: the RSAC 2026 and TITAN AI Edition

This is SecurityScorecard's Weekly Brief: the RSAC 2026 and TITAN AI Edition. This week, SecurityScorecard unveiled TITAN AI upon touchdown at RSAC 2026 in San Francisco. The new platform is pioneering the modern era of TPRM, leveraging AI, enhanced threat intelligence, and continuous monitoring to deliver measurable supply chain resilience to customers.