Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Key learnings from the 2025 State of Cloud Security study

We have just released the 2025 State of Cloud Security study, where we analyzed the security posture of thousands of organizations using AWS, Azure, and Google Cloud. In particular, we found that: In this post, we provide key recommendations based on these findings, and we explain how you can use Datadog Cloud Security to improve your security posture.

Off the Blocks | Ep. 3: What Does the Future of Onchain Finance Mean to You?

New question. Real answers. No fluff. Welcome back to Off the Blocks — Fireblocks’ rapid-fire video series, shot live at TOKEN2049 Singapore. In Episode 3, we asked industry leaders just one thing: In one sentence, what does the future of onchain finance mean to you? From programmable liquidity to permissioned DeFi, their responses are bold, honest, and sharply focused on what comes next. This is where ideas become infrastructure, and where vision meets execution.

Falcon Exposure Management Network Vulnerability Assessment: Demo Drill Down

CrowdStrike Falcon Exposure Management simplifies network security with its Network Vulnerability Assessment, offering a modern way to secure network infrastructure without complex legacy tools. Learn how the system utilizes your existing Falcon sensors to provide unmatched continuous visibility-instantly correlating new threats against your assets—and leverage authenticated scanning for deeper, more complete vulnerability inspection.

Intel Chat: TruffleNet exploit, React Native vulnerability, SesameOp OpenAI & SkyCloak [265]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

November 10, 2025 Cyber Threat Intelligence Briefing

Microsoft’s DART team identified a new backdoor named SESAMEOP in July 2025 that uses the OpenAI Assistants API as its command and control (C2) channel. Proofpoint has detailed a campaign targeting freight and trucking companies using remote monitoring and management (RMM) tools to steal cargo. Security researchers at Catchify identified a critical unauthenticated remote code execution vulnerability in the UniFi Access backup/export workflow, tracked as CVE-2025-52665, with a CVSS score of 10.0 (critical).

What Is a Dictionary Attack In Cyber Security? How To Detect & Prevent It?

Most people are aware of ways to ensure their online security, yet they often fail to implement them fully. A common guideline when signing up for an account on any website is to create a strong password; however, 65% of people reuse passwords across websites. Not just that, people use passwords that are easier to guess, like ‘123456’, ‘iloveyou’, ‘welcome’, and personal details. These passwords regularly appear in data breach leaks.

The 3-2-1-1-0 Backup Strategy Explained

Your backup system is supposed to be your safety net. It’s the insurance policy that lets you sleep at night knowing that even if disaster strikes, your business can recover. But there’s a problem: ransomware attackers know about your backups too. And they’re coming for them first. According to data shared in our recent webinar with Pellera, 89% of organizations that experienced ransomware attacks saw clear indications that attackers specifically targeted their backup infrastructure.

Quantum Route Redirect: Anonymous Tool Streamlining Global Phishing Attack

KnowBe4 Threat Labs has uncovered an emerging advanced phishing campaign targeting Microsoft 365 users globally to steal their credentials. The attackers are wielding a powerful new tool that’s completely changing the game for cybercriminals—turning what used to be complex, technical phishing setups into simple one-click launches that can bypass certain technical controls. Welcome to the era of “Quantum Route Redirect.".

Malicious NPM Package Found Targeting GitHub By Typosquatting on GitHub Action Packages

The package states it is for the GitHub Actions Toolkit, which has a legitimate npm package @actions/artifact. Therefore this malware package is a clear typosquat with the swapping of the letters “ti” for “it”. We took a look at the “harness” binary as indicated in version 4.0.13.