Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Intel Chat: PeckBirdy, ShinyHunters, Moltbot impersonation & ELECTRUM [289]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Inside A Government Agency With No Threat Model

A central government department relied on a part time virtual security lead, ageing tools and no central view of security data, with nobody owning real decisions. When asked what type of attacker would target their systems or whether they had a threat led defence, nobody from engineering to leadership had an answer, despite direct access to national guidance.

Security Simplified: Endpoint Protection Made for Everyone

Attackers continue to move faster, automate more aggressively, and operate with greater precision at the endpoint. Detection alone is no longer enough. Security teams need clarity, context, and the ability to act decisively as threats unfold. Yet many endpoint approaches still rely heavily on manual investigation and response workflows that require human intervention. The result is alert overload, delayed response, increased operational effort, and growing pressure on already-stretched security teams.

How Hackers Used Distraction To Rob Gaming Giant Ubisoft

Attackers broke into major gaming platform Ubisoft and started spraying free in-game currency, triggering confusion as teams tried to understand the sudden rush of skins and purchases. While everyone focused on the noisy mess, the intruders quietly stole source code for the full game catalogue, walking away with the real prize.

Fool Me Once: How Cybercriminals Perfected Deception | LevelBlue Threat Trends Report (Ed. 2)

Originally recorded in 2025, we look back at how cybercriminals perfected deception during the first half of the year. Now available as an archive recording, the session highlights the second edition of the LevelBlue Threat Trends Report and explores real-world incident data, fast-moving attack chains, and the social engineering techniques that shaped the threat landscape at the time. While the data reflects early 2025, many of the lessons remain relevant for understanding how today’s threat environment evolved.

Fast, Secure, Resilient: Modernizing Application Security at Scale

Software release cycles are now too fast for traditional security tools. Rapid iterations and reliance on open-source and cloud-native tech increase vulnerabilities, challenging AppSec teams to keep up. Attackers are taking advantage, targeting applications and exploiting misconfigurations, excessive permissions, and vulnerable plug-ins.

Why You Cannot Run Business Like A Government

Geopolitics runs on the idea that if one country is not first, another will be, and that logic is now leaking into corporate strategy. Nation states can absorb failure in pursuit of an edge, but most businesses have a low tolerance for failure, so importing that mindset turns ambitious bets into existential risks.

Nightfall Forensic Search Demo: Complete Insider Risk Investigation in Minutes

See how security teams reconstruct insider risk investigations with Nightfall's new Forensic Search feature, going beyond policy alerts to uncover the complete story behind every potential threat. In this 15-minute demo, watch three real-world investigation scenarios: Departing engineer exfiltrating code to personal cloud storage Sales associate moving customer data to USB devices CFO accidentally using shadow IT with sensitive financial data.

Securing Non-Human Identities with Falcon Next-Gen Identity Security

Secure every identity, including non-human identities and AI agents. Falcon Next-Gen Identity Security delivers complete visibility, least-privileged access, and real-time threat detection and response for non-human identities. Watch the demo to see how CrowdStrike stops identity-based threats. Subscribe and stay updated. Thank you for watching!