150+ FAKE law firm websites found in AI cloning scam #cybersecurity #ai #podcast

In this week's Intel Chat, Christopher Luft and Matt Bromiley discuss how attackers used AI to clone over 150 law firm websites, targeting fraud victims under the guise of offering legal assistance to recover lost funds. Chris points out how easy this has become with AI tools. Attackers can quickly clone a website, host it at a legitimate-looking domain, and start harvesting information. The episode also covers Russian cyber operations targeting the defense industrial base, Team PCP's campaign compromising 60,000+ servers, and exposed OLAMA AI infrastructure.

Who Controls LLMs? Digital Sovereignty, Policy, and AI Security Risks | India AI Impact Summit 2026

AI agents are quickly becoming first-class actors in the digital ecosystem—logging into systems, invoking multiple APIs, collaborating, and even interacting socially with other agents. In a panel discussion on “Enhancing Cyber Resilience Across the Digital Ecosystem”, the miniOrange Founder & CEO Mr. Anirban Mukherji highlighted why digital identity is now the foundation for securing agent-driven environments, especially as authentication and authorization protocols expand globally across platforms and enterprises.

Complete Guide to Understanding CMMC Compliance

Cybersecurity requirements for companies in the defense supply chain have entered a decisive enforcement phase. The Department of Defense has moved beyond self-attestation and toward verifiable, contract-bound cybersecurity standards. The Cybersecurity Maturity Model Certification (CMMC), now plays a central role in determining which organizations are eligible to work with the DoD. CMMC establishes three compliance levels, each tied directly to the sensitivity of the data an organization handles.

LevelBlue Named a Representative Vendor in 2026 Gartner Market Guide for Outsourced Managed Security Services

LevelBlue is proud to announce it has been named a Representative Vendor in the just-released 2026 Gartner Market Guide for Outsourced Managed Security Services (OMSS). OMSS, which is a subset of Managed Security Services, provides organizations with specialized external expertise and operational support for critical cybersecurity functions.

LimaCharlie + @claude Code: Admin Tasks, MITRE Coverage, and EDR Detections [Demo]

Claude Code runs directly inside the LimaCharlie UI, connecting to the MCP server and loading the skills needed to execute commands across your environment. In this video, you'll see it in action for common administrative tasks: identifying organizations and their IDs, pulling sensor counts for a specific org, and getting a full breakdown of containers by type. SOC managers can query this information conversationally rather than navigating multiple menus or writing custom scripts.

How Passkey Management Works in Keeper

Keeper’s passkey management works by letting you create, store and use passkeys directly from your Keeper Vault so you can sign in with biometric or device-based authentication instead of traditional passwords. By removing shared secrets and replacing them with cryptographic credentials tied to your device, Keeper makes signing in faster, more secure and resistant to phishing attacks.

How to Set up the OTP Verification Plugin with WooCommerce Checkout Form?

The miniOrange OTP Verification Plugin validates customers' email addresses or mobile numbers by sending a One-Time Password (OTP) during the checkout process. By confirming the authenticity of the provided contact details, this plugin helps prevent fake orders, reduces fraud, and ensures secure transactions. In this video, we walk you through the complete step-by-step setup of the miniOrange OTP Verification plugin with the WooCommerce Checkout form. Follow along to enable OTP verification and enhance your store’s security.