Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The MemcycoFM Show: Episode 5 - DNS Cache Poisoning Prevention: How to Protect Accounts in Real-Time

For security teams, it’s no great revelation to say that DNS cache poisoning prevention is essential for guarding against attacks using that vector. But it’s easier said than done. While traditional network-layer defenses like DNSSEC reduce poisoning risk, they can’t fully prevent it. Downstream – after redirection – bad actors await, ready to harvest credentials, bypass MFA, and take over accounts.

Why Hackers Ignore Zero-Days (And What They Use Instead)

You'd think hackers use the latest zero-day exploits, right? WRONG! PwC's threat intelligence reveals hackers are actually exploiting OLD vulnerabilities that companies just... forgot to patch While cybersecurity teams chase shiny new threats, criminals are walking through the front door with keys we left lying around. The scariest part? Even criminal groups (not just nation-states) are making this their primary attack method.

[Webinar] Protecting Innovation: Use AI Securely While Safeguarding Data

AI use at work has exploded—nearly every employee is experimenting with AI tools. But behind the productivity gains lies a major blind spot: 71% of AI apps in use today were not approved by IT or security teams. These tools are flying under the radar, and they’re sending sensitive company data to unknown third parties. Cyberhaven Labs analyzed AI tool usage across millions of real-world events and found widespread shadow AI, uncontrolled data exposure, and risky behavior by employees—often without realizing it. The implications are clear: you can’t secure what you can’t see.

Dark Web Monitoring with Continuous Attack Surface Management

JUMPSEC explains how CASM -continuous attack surface management adds another layer of intelligence. CASM continuously monitors dark web forums, illicit marketplaces, and underground communities where threat actors discuss vulnerabilities, trade stolen credentials, and plan their next attacks. Uncovering early warning signs that traditional tools miss.

Smarter API Security Demo: See How Wallarm Protects Modern APIs and Agentic AI

Modern APIs are under constant attack—from botnets to logic abuse to threats targeting Agentic AI. Most security tools lag behind. Wallarm doesn’t. Join us for a live walkthrough of Wallarm’s advanced API security platform. In this session you will see how to instantly discover vulnerable endpoints, protect business-critical flows, and stop API abuse—without slowing down your teams. What you'll learn.

From Chaos to Clarity: How to Modernize Vulnerability Management

Fragmented tools. Manual data wrangling. Burned-out teams. Sound familiar? In this expert roundtable with Trey Ford (CISO, Bugcrowd) and Jeff Gouge (CISO, Nucleus Security), we break down how today’s security leaders can transform vulnerability management from a chaotic, spreadsheet-driven burden into a unified, automated, and trusted function. Watch to learn.

Software Security: Treat Vulnerabilities Like Regular Bugs! #cybersecurity #softwaresecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.