Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cybercrime's New Goal: It's Not Your Data, It's Your Time

The economic model of cybercrime is shifting from stealing data to creating time drag on the systems that keep the business running. Loud ransomware taught everyone to expect clear incidents, but quieter attacks now focus on prolonged disruption, where boards pay to restore growth and confidence without ever declaring a cyber event.

Claude Code writes and tests Cobalt Strike detection rules #cybersecurity #ai #securityoperations

Watch Claude Code generate production-ready Cobalt Strike detection rules in LimaCharlie. The agent defines detection requirements, creates rule logic for high-signal patterns, validates syntax, and deploys rules to the tenant. Named-pipe indicators and process-based signatures are tested against positive and negative controls to confirm accuracy. Security teams can operationalize threat-specific detections in minutes instead of hours.

ChatGPT Oopsies Series of Information - The 443 Podcast - Episode 356

This week on the podcast, we cover a Politico report detailing a security lapse at CISA in the United States involving sensitive data and a public version of ChatGPT. Next, we dive into a couple of recently resolved vulnerabilities in the SolarWinds Web Help Desk application. Finally, we end with some closure on a story about two Coalfire penetration testers who were arrested several years ago for completing a penetration test in Iowa.

What Are Moltbot and Moltbook? Why the Agentic AI Frenzy Is a Security Trap

AI agents aren’t taking over. But agentic AI without security is a real problem. Over the last few days, Moltbot and its social platform Moltbook have surged across headlines and social media. Some are calling it a glimpse of artificial general intelligence. Others say AI agents are organizing themselves. That’s not what’s happening. In this video, SecurityScorecard’s Jeremy Turner, VP of Threat Intelligence & Research, breaks down what Moltbot actually is, why this isn’t AGI, and where the real danger lives.

Ep 28: Stop being the 'no' department: How modern GRC enables growth

On this episode of Masters of Data, we sit down with Cassandra Mooseberger, Manager of Security Compliance at Sumo Logic, to unpack governance, risk, and compliance (GRC). Cass breaks down her three-pillar framework: governance and compliance, risk management, and trust. She reveals how GRC teams can flip from cost center to sales enabler through trust pages, automated questionnaires, and proactive support. We explore practical strategies for working with engineering: listen first, understand before changing, and skip the "rip and replace" impulse.

How to build secure agent swarms that power autonomous systems in production

We worked with the Autonomy team to show how 1Password can secure agent swarms using a safer pattern: just-in-time, least-privilege access, without inheriting broad device, cloud, or infrastructure permissions, and without hardcoding secrets into agents.

Acronis True Image - How to Do a Backup

Acronis True Image: Your digital bodyguard. Protect everything that matters. Backup. Recover. Defend. All with one click. It’s not a matter of if something will happen, but when. The real question is — are you prepared? With Acronis True Image, you have everything you need to protect your digital life and keep your data safe from unexpected events. Today’s world is full of risks — from hardware failures to cyberattacks. That’s why Acronis True Image combines secure backup with advanced cybersecurity, giving you complete protection in one easy-to-use solution.