Why Every IT Admin Needs Keeper in Their Security Technology Stack

According to ConductorOne’s 2024 Identity Security Outlook Report, 24% of security leaders say keeping up with new technological advances and attack vectors is their biggest obstacle. Addressing this challenge requires modern solutions that can adapt quickly, centralize visibility and protect privileged access.

CrowdStrike Leads the Way in the 2025 MITRE ATT&CK Enterprise Evaluations

The results of the 2025 MITRE ATT&CK Enterprise Evaluations are in and CrowdStrike excelled, achieving 100% detection, 100% protection, and zero false positives. The MITRE ATT&CK evaluation is an independent assessment that tests how cybersecurity products detect and stop real-world adversary behavior. The 2025 round was the most challenging cross-domain evaluation to date, a true platform test. For the first time, MITRE tested defenses across endpoint, identity, and cloud.

SAST in the IDE is now free: Moving SAST to where development actually happens

We’re making a fundamental change to how teams use SAST. SAST in the IDE is now free. This means developers can run SAST scans directly inside their editor, with real-time feedback and project-wide visibility, using the same analysis engine and SAST rules as Aikido. Detection runs automatically as developers work, without limiting coverage at the detection layer.

How To Protect Non-Human Identities (NHIs)

Non-human identities have become one of the most overlooked yet exploited attack surfaces in the modern enterprise. NHIs are entities that interact with systems and services but are not tied to a physical user. As organizations expand across hybrid and multi-cloud environments, thousands of machine-based identities are silently running critical operations, yet most are unmanaged, invisible and vulnerable to abuse.

The only vendor standing: Elastic's clean sweep in 2025 AV-Comparatives Tests

In the current threat landscape, the margin for error is nonexistent. According to the IBM Cost of a Data Breach Report 2025,1 the average cost of a data breach in the US has surged to a record $10.22 million — a 9% increase from the previous year. For security teams, this reality creates a high-pressure environment where every missed signal or allowed compromise can spiral into a headline-making crisis.

Intel Chat: React2Shell, GeminiJack vulnerability, proRussia hacktivist arrested & Warp Panda [276]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Original CrowdStrike article. CISA BRICKSTORM Backdoor breakdown. Analysis report PDF. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

2025 cloud security roundup: How attackers abused identities, supply chains, and AI

In 2025, many of the long-standing cloud security concerns remained, but new areas of focus also developed. The significant increase in AI adoption enabled organizations to deliver features faster but also introduced new attack surfaces, such as untrusted or unpredictable user input for large language model (LLM) applications. At the same time, long-lived credentials and vulnerabilities in third-party packages continued to expose cloud environments to risk.