Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

April 28, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: POC Exploit Released for Erlang CVSS 10 Vulnerability The vulnerability allows an attacker with network access to an Erlang/OTP SSH server to execute arbitrary code without prior authentication. NTLM Hash Leaking Vulnerability Actively Exploited Checkpoint researchers report that they have detected active exploitation of CVE-2025-24054, a hash disclosure via spoofing vulnerability that was patched as part of Microsoft’s March patching cycle.

SASE Talks on the Couch with Cato Networks' Abraham Gonzalez

Abraham’s got years of field experience, and he knows why customers hesitate: promises that never deliver. But once they see Cato in action, their perspective shifts completely. Watch below as Abraham shares a memorable moment when Cato made a customer's phone system work for the first time, all while delivering simplicity, power, and results. Ready to see a true SASE platform in action? Book a demo today.

Can This AI Save My Job? (Google Gemini 2.5 Pro)

In this video, I’ll be putting Google’s Gemini 2.5 AI to the test — challenging it to generate 100% secure and safe code for a note taking application. The catch? My job is on the line... and the code has to pass all security checks to avoid critical vulnerabilities. I’ll be diving into how Gemini 2.5 performs under pressure and examining whether AI can truly be trusted with secure coding. Resources.

Securing AI Isn't Just About Your Pipeline #AIsecurity #DevSecOps #AppSec #redteaming

Building AI apps securely is not just about plugging tools into your dev pipeline. It’s about knowing what to do with those tools after they give you results. What risks matter? What policies should you apply? And when is the right time to integrate AI security into your CI/CD? Bar-El Tayouri sits down with Ashish Rajan from The Cloud Security Podcast to discuss why red teaming and scanning aren’t enough and how getting comfortable with AI security before production pays off long-term.

Drupal Single Sign On - Okta as OAuth Provider

This video will walk you through the steps required to configure Okta as OAuth Provider and Drupal as OAuth Client. The module allows users to log in to the Drupal site using their Okta credentials. Chapters: Don't forget to subscribe to our channel and click on a bell icon to get notifications about new uploads.

Ep 7: Everything Everywhere All At Once

The General Manager of an electric and water utility in Littleton, Mass. gets a surprise call from the FBI. At first he suspects the caller is a spammer, but soon he learns the agent is very real. Chinese hackers are lurking deep in his utility’s systems. And his is not the only one. Hundreds of other power, water and pipeline operations across the United States are getting hit. These targets have little to no intelligence value at all. But their potential for sabotage? Enormous.

HR-Driven Identity and Access Management: Mini OneLogin Demo

Managing employee identities is a shared responsibility between IT and HR. OneLogin simplifies this with automated lifecycle management, connecting accurate HR data to IT systems for seamless account creation, updates and access control. Employees get fast, secure access to apps through a centralized portal.

Why does an enterprise need Endpoint Protection ?

In today's interconnected world, your endpoints are your most vulnerable targets. This video explains why every enterprise needs robust endpoint protection and introduces Fidelis Endpoint as the solution for comprehensive security. Learn how a single click from any device can compromise your entire network and why traditional security measures fail against modern, sophisticated attacks. With remote work becoming the norm, your security perimeter has expanded beyond recognition - making endpoint protection more critical than ever. Discover how Fidelis Endpoint provides.