Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Workshop: Analyzing Real Malware with Claude Code and LimaCharlie

In this hands-on workshop we will analyze an unknown binary, quickly extract indicators, and determine the binary’s core functionality. We'll give Claude the LCRE (LimaCharlie Reverse Engineering) tool to accelerate analysis and interpretation by identifying configuration details, key behaviors, and any additional indicators useful for rule building. We'll use this information to craft detection rules for this sample.

Your AI Agents Are Already Acting. The Question Is Whether You Can See What They're Doing.

In conversations with CISOs about their agentic environments, the question I ask first is not whether they have agents deployed. Most do. It is not whether those agents are creating value. Most are. The question I ask is whether they have mapped their Agentic Security Graph. Almost none of them have. And that gap, between the agentic infrastructure that exists inside their organizations and the visibility they have into it, is where the most serious AI security risk in the enterprise lives right now.

INETCO's Bijan Sanii on the threat every South African bank should be worried about

Article by Luis Monzon originally published on MyBroadband, May 9, 2026. Anthropic’s AI model Mythos, part of its Claude software, represented a clear threat to banks and financial institutions in South Africa. This is according to Bijan Sanii, CEO of Canadian fraud detection provider INETCO. Anthropic, one of the world’s most important generative AI makers, positioned Mythos as an extremely capable AI model designed to identify vulnerabilities in critical software beyond human capabilities.

TEFCA compliance for digital health companies: a guide to identity proofing

In 1996, the US signed the Health Insurance Portability and Accountability Act (HIPAA) into law. One of the government’s chief goals was to safeguard sensitive patient data and protected health information (PHI) from unauthorized disclosure. While these protections were critical, HIPAA compliance requirements (alongside an already-fragmented electronic health record systems) have led to ongoing data silos across healthcare.

What You Need to Know about the BWH Hotels Data Breach

BWH Hotel Group is one of the world's largest hotel networks, operating more than 4,000 hotels in over 100 countries. The company evolved from Best Western and today manages a multi-brand portfolio spanning budget to luxury hospitality. BWH Hotels' portfolio includes prominent brands such as Best Western Hotels & Resorts, WorldHotels, and Sure Hotels, serving millions of guests annually across approximately 4,300 hotels that generate more than $8.5 billion in annual revenue.

Your Browser Is Leaking More of Your Company's Data Than You Think

In this video, you will learn why agentic browsers like ChatGPT Atlas, Perplexity Comet, and Arc have turned the browser into a double agent inside your enterprise, how shadow adoption is bypassing MDM and endpoint controls in days, and why indirect prompt injection creates an attack surface your file-based DLP cannot see. You will also learn how data lineage replaces noisy content inspection with origin-and-destination tracking, so you can stop the leak without blocking the tools your business depends on.

Enabling Mirantis Self-Service Virtualization with CloudCasa

As enterprises modernize infrastructure, the shift toward self-service virtualization on Kubernetes is accelerating. Platforms such as Mirantis k0rdent AI and k0rdent Enterprise feature KubeVirt-based virtualization, enabling organizations to deliver on-demand infrastructure while maintaining governance controls.

Six MCP Security Incidents Every Security Leader Should Know

In July 2025, an AI agent reviewed a support ticket, queried a production database, and leaked integration tokens directly to the attacker watching the thread. Months earlier, another AI followed "hidden instructions" in a public repository, exfiltrating private code into a visible pull request. In both cases, the AI wasn't broken; it simply obeyed the attacker instead of the developer.

Data quality defines a ceiling for SOC performance

Defenders have long known that richer evidence improves security outcomes by enabling faster triage, deeper analysis, and more complete investigation. Although Corelight was founded on this premise, it’s been hard for us to quantify the impact of better network data - until now. Recently, we built an agentic test harness to measure the success of frontier LLMs in responding to real-world attack scenarios, using a range of source data.