Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

NVIDIA Just Made AI Agents Production-Ready #ai #shorts

AI agents just became production-ready overnight. With NVIDIA’s new NeMo Guardrails / NemoClaw-style agent control systems, AI agents can now operate in controlled environments with policies, sandboxing, and guardrails. Sounds safe… but there’s a catch. Agent safety protects what the AI does. But it doesn’t secure what the AI knows. And that’s where the real enterprise risk appears. In this video we break down the difference between.

Smishing AI

Cybercriminals are evolving—and so are their tactics. Smishing, or SMS phishing, has become one of the fastest-growing mobile threats. With AI, attackers can now create convincing, personalized messages in seconds—removing language barriers and making scams harder than ever to detect. That’s where Lookout Smishing AI comes in. Our advanced AI-powered detection goes beyond scanning for malicious links. It identifies the intent behind every message—stopping social engineering attacks before they reach you. Whether there’s a URL or not, Lookout keeps your mobile workforce protected.

Mobile Threat Report Briefing

In this video, David Richardson, Product CTO at Lookout, provides a strategic overview of the evolving mobile threat landscape based on Q3 2025 global enterprise data. Key Insights: Dominant Attack Vectors: Mobile phishing and social engineering remain the most significant threat categories. Attackers are increasingly using AI-powered tools to craft authentic-looking messages and conduct deep research for highly targeted attacks.

IRGC threatens tech companies, FBI Director hacked, Venom Stealer & Hasbro breach / Intel Chat [307]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Stopping JSCEAL Before Data Theft Begins: Detection and Prevention in Cato SASE

JavaScript-based crypto stealers are designed to hide in plain sight. They arrive over innocent-looking, encrypted web traffic and aim to steal credentials and wallet data before anyone notices. In this demo, you’ll see how the Cato SASE Platform stops a real JavaScript crypto stealer (JSCEAL) in real time. We show: How the malware is delivered over standard web traffic How Cato inspects encrypted traffic inline, in a single pass How the attack is identified and blocked before it reaches the endpoint How security teams get immediate visibility in the Cato Management Application.

Start Anywhere, Grow Everywhere: The Modular SASE Platform

Complexity is no longer just an operational inconvenience for a business when it’s slowing transformation and increasing costs. In a portfolio platform, that complexity is structural: separate inspection engines, overlapping functionality, and distinct policy frameworks. Cato is redefining what a true SASE platform means in the AI era - unifying architecture, reducing complexity, and unlocking measurable economic advantage. And best of all, it means starting anywhere, and growing everywhere.

Everyone is Deploying AI Agents. Almost Nobody Knows What They're Doing

AI agents are operating inside your enterprise; querying databases, triggering workflows, and taking action through APIs. As AI agents are adopted, organizations cannot see, track, or control what these agents are actually doing. In this session, Roey Eliyahu, Co-Founder and CEO of Salt Security, challenges the industry’s narrow focus on LLM safety and exposes the much larger, invisible attack surface created by agentic systems.

WatchGuard Recognized at the 2026 Cybersecurity Excellence Awards

We’re proud to announce that WatchGuard Technologies has been named Best Cybersecurity Company in the 2026 Cybersecurity Excellence Awards, recognizing innovation and leadership across the cybersecurity industry. While industry recognition is always an honor, this award comes at a particularly important moment for cybersecurity teams worldwide.

Using Agentic AI to Scale Threat Detection in Healthcare

For every human in a healthcare organization, there are 82 machine identities—service accounts, API keys, cloud functions, medical devices.2 That's the 82:1 ratio, and it means your team is fundamentally outnumbered. The Change Healthcare breach in 2024, which started with one unprotected Citrix credential and disrupted 40% of US claims processing,1 showed exactly what happens when that ratio goes unmanaged. The numbers back this up.

Why Banks Need Real-Time Privileged Session Monitoring

Ransomware and stolen credentials are among the most common and harmful attack vectors targeting financial institutions. Since banking systems store valuable financial assets and sensitive customer data, organizations must demonstrate strict control and oversight of privileged access to support regulatory and audit expectations under frameworks such as SOX, PCI DSS and GLBA.