Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing Atlas: a global age regulation tracker

Over 300 age-related bills were introduced across several US states in 2025 alone. We’ve heard firsthand from numerous legal and compliance teams that keeping up with these regulations is incredibly overwhelming. That’s why we developed Atlas, a global database tracking evolving age assurance regulations. Atlas tracks recent legislation impacting social media platforms, adult content, age-restricted services, and other related legislation.

Agentic SecOps: Build a security AI agent that automatically investigates detections

A credential access event fired. An AI agent investigated it, correlated it against running processes, assessed the risk, and closed the ticket. No analyst touched it. The entire loop ran in minutes. This is what security operations look like when AI can actually operate in the environment rather than advise from outside it. Security operations have always required a special kind of person.

NSW Treasury Breach, ABAC, and Principles of Least Privilege

Recent headlines heralded another unfortunate security breach: an employee of the NSW Treasury in Sydney, Australia, illegally downloaded more than 5,600 sensitive government documents, which were later recovered at his home. This was labeled a “significant cyber incident” by the NSW government and had been detected by an internal security monitoring tool that detected “movement of a large cache of documents”.

Is Your Official Vendor List a Lie?

How many new vendors did your team engage with today? If you’re looking at your official procurement list, the answer might be zero. But if you’re looking at employee behavior, the reality is likely much higher. Find out more about the shadow supply chain in our most recent research report: Interested in finding out more about UpGuard?

What Is Red Team Penetration Testing?

Red Team Penetration Testing is a simulated cyberattack that mimics real-world threat behavior to identify vulnerabilities, test defenses, and evaluate how effectively an organization can detect and respond to an attack. It goes beyond traditional testing by focusing on how an attacker would actually move through an environment.

Crypto theft, Vercel breach, Mastodon attack, North Korean IT in US & cyber negotiator guilty [316]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

April 27, 2026 Emerging Threats Weekly

This week’s briefing covers: The attack chain invokes two preparatory batch scripts before the final wiper stage. Those scripts disable services, enumerate users, change passwords, log off sessions, disable network interfaces and begin destructive actions with diskpart, robocopy and fsutil before the final payload is launched. Dive deeper.

Darling Ingredients Consolidates Vendors, Increases Agility, and Saves $750K+ Annually with Cato

As Darling Ingredients expanded, so did the opportunity to modernize how its global operations are connected and secured. With the Cato SASE Platform, the Darling Ingredients’ IT team replaced complexity with consistency, reduced costs, and gained the agility to support smarter growth, elevating IT as a strategic partner to the business.