Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The MemcycoFM Show: Episode 5 - DNS Cache Poisoning Prevention: How to Protect Accounts in Real-Time

For security teams, it’s no great revelation to say that DNS cache poisoning prevention is essential for guarding against attacks using that vector. But it’s easier said than done. While traditional network-layer defenses like DNSSEC reduce poisoning risk, they can’t fully prevent it. Downstream – after redirection – bad actors await, ready to harvest credentials, bypass MFA, and take over accounts.

Secrets Scanning: A Critical Practice for Protecting Sensitive Data in Code

With the rise of CI/CD pipelines, cloud-native development, and globally distributed teams, sensitive credentials like API keys, tokens, and database passwords often slip into source code. Sometimes accidentally, sometimes under pressure to deploy fast. This is not a rare mishap. A recent study found that 34% of API security incidents involve sensitive data exposure. And according to Cyble, over 1.5 million.env files containing secrets have been discovered in publicly accessible environments.

How Fidelis Deception Strengthens Network Detection and Response

Network Detection and Response systems excel at monitoring network traffic and identifying patterns, but they face inherent challenges with sophisticated threats that mimic legitimate behavior. Fidelis Deception addresses these NDR limitations by creating definitive detection points that eliminate ambiguity in threat identification.

Trustwave SpiderLabs Goes Inside the AI Cyber Arms Race

While all manner of legitimate organizations are attempting to understand how to best and safely use artificial intelligence to improve productivity, the Trustwave SpiderLabs' Technology Deep Dive: AI Cyber Arms Race takes a forward-looking view at how adversaries are gaining experience and capability in their ability to turn AI against us.

Why Hackers Ignore Zero-Days (And What They Use Instead)

You'd think hackers use the latest zero-day exploits, right? WRONG! PwC's threat intelligence reveals hackers are actually exploiting OLD vulnerabilities that companies just... forgot to patch While cybersecurity teams chase shiny new threats, criminals are walking through the front door with keys we left lying around. The scariest part? Even criminal groups (not just nation-states) are making this their primary attack method.

[Webinar] Protecting Innovation: Use AI Securely While Safeguarding Data

AI use at work has exploded—nearly every employee is experimenting with AI tools. But behind the productivity gains lies a major blind spot: 71% of AI apps in use today were not approved by IT or security teams. These tools are flying under the radar, and they’re sending sensitive company data to unknown third parties. Cyberhaven Labs analyzed AI tool usage across millions of real-world events and found widespread shadow AI, uncontrolled data exposure, and risky behavior by employees—often without realizing it. The implications are clear: you can’t secure what you can’t see.

Dark Web Monitoring with Continuous Attack Surface Management

JUMPSEC explains how CASM -continuous attack surface management adds another layer of intelligence. CASM continuously monitors dark web forums, illicit marketplaces, and underground communities where threat actors discuss vulnerabilities, trade stolen credentials, and plan their next attacks. Uncovering early warning signs that traditional tools miss.