Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ep. 45 - Teen Hackers, SIM Swaps & Russian Ransomware

In Part 2 of our Russia cyber threat series, we unpack the Western cybercrime ecosystem powering Russian ransomware operations. We examine *Scattered Spider, LAPSUS$, and Shiny Hunters*, and how social engineering, SIM swapping, MFA bypass, and AI-driven voice spoofing are breaching Fortune 100 companies — without zero-days. Learn how access brokers commoditize breaches, why help desks are prime targets, and what this shift means for CISOs and security teams.

Introducing the Keeper Security Slack App

The Keeper Security Slack App brings zero standing privilege and streamlined credential workflows directly into Slack – the platform your team already uses every day. This powerful integration connects your Keeper Vault with Slack, enabling secure credential access requests and approvals without ever leaving your workspace.

Detect OPERATOR PANDA at the Edge with Falcon Adversary Overwatch

CrowdStrike Falcon Adversary Overwatch: ► Detect adversaries hiding in your blind spots. Falcon Adversary Overwatch exposes threats targeting network edge devices—firewalls, routers, and infrastructure traditional security tools can’t see. Watch the demo to see how CrowdStrike detects OPERATOR PANDA in real time and stops edge-driven intrusions that quickly turn into credential theft and identity abuse before they escalate.

Claude Code-powered multi-tenant SecOps for MSSPs | LimaCharlie demo

See how LimCharlie's Agentic SecOps Workspace handles multi-tenant security operations at scale. This demo walks through real-world scenarios that MSSPs face daily: Unlike token-based AI tools that become cost-prohibitive at scale, this platform uses a flat-fee per analyst model. Every capability in your tech stack becomes accessible through AI-powered automation, and you maintain full control with granular permissions.

Training Humans and AI Agents

Managing the risks associated with the increasing use of AI agents and co-pilots is critical for every organization. A key challenge is that AI agents draft documents and influence decisions but they operate without a true understanding of a company's rules, culture, or risk. Like humans, AI agents are susceptible to failure. Humans are socially engineered, while AI agents are prompt engineered, and AI agents may "hallucinate" when context is missing, similar to how humans guess.

Exposed OpenClaw Deployments are Turning Agentic AI Into an Attack Surface: What To Do Next

SecurityScorecard's STRIKE Threat Intelligence team has uncovered tens of thousands of exposed OpenClaw instances, many of which are vulnerable to Remote Code Execution (RCE). These exposed OpenClaw instances leave users and organizations open to attacks. OpenClaw and other agentic AI tools are designed to take actions on a user’s behalf, interact with infrastructure, and move across connected services. That functionality is the appeal. It is also the risk for users around the globe.

Securing the Human Layer: The Evolution of Cyber Attacks | Podcast

In this one-off exclusive podcast, Oliver Simonnet, CultureAI's Lead Cyber Security Researcher, sits down with William Jardine, Director at Reversec, and Richard Moore, CISO at 10x Banking, to explore the evolving realities of cyber resilience, AI adoption, and security leadership in a world where AI-driven workflows are becoming the norm.