Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Is This the Best Coding Model in the World? Claude Sonnet 4.5

In this episode of our AI Coding Tools series, we test Claude Sonnet 4.5 to see if it can build a secure note-taking app. The model claims to be the best in the world — but does it live up to the hype? We’ll cover how it codes, where it shines (or struggles), and how it stacks up against other AI coding assistants.

How to Choose the Right Cloud DDoS Solution for Enterprise Security

Enterprise DDoS attacks reached critical levels in 2025, with authoritative reports documenting unprecedented attack volumes and sophistication. Global cybercrime costs are projected to reach $10.5 trillion annually by 2025, representing the greatest transfer of economic wealth in history. Selecting the wrong cloud DDoS protection creates operational disruption, compliance violations, and irreversible business damage.

LLM Security in 2025: Risks, Mitigations & What's Next

Large language model (LLM) security refers to the strategies and practices that protect the confidentiality, integrity, and availability of AI systems that use large language models. These models, such as OpenAI’s GPT series, are trained on vast datasets and can generate, translate, summarize, and analyze text. However, like any complex software component, LLMs present unique attack surfaces because they can be influenced by the data they process and the prompts they receive from users.

How ZenBusiness Protects Data Across SaaS While Scaling Safely | Nightfall AI Case Study

ZenBusiness has empowered over 850,000 business owners to launch and grow their businesses. And they’re doing it without letting data protection slow them down. With Nightfall AI’s automation-first DLP, ZenBusiness secures critical enterprise apps, resolves issues efficiently, and keeps their focus on delivering value to business owners. Chris Chipman, Enterprise IT Architect at ZenBusiness, calls Nightfall “that extra IT staff member” that runs 24/7, protecting data wherever it goes.

Reimagining Trust in Software Releases: A New Approach to Supply Chain Integrity (Part 1)

Only secure, verified, compliant software should reach production. Full stop. With increasing pressure on modern development teams to deliver across security and compliance requirements, a fully-secured, attestable pipeline demands complete visibility and control across the entire release lifecycle in a single solution.

Reimagining Trust in Software Releases: A New Approach to Supply Chain Integrity (Part 2)

Only secure, verified, compliant software should reach production. Full stop. With increasing pressure on modern development teams to deliver across security and compliance requirements, a fully-secured, attestable pipeline demands complete visibility and control across the entire release lifecycle in a single solution.

How KeeperPAM Replaces Traditional ZTNA Solutions

Most Zero Trust Network Access (ZTNA) solutions claim to eliminate perimeter-based security risks, but many actually introduce new vulnerabilities. At the DEF CON hacking conference in August 2025, researchers revealed significant flaws in several popular ZTNA products, including authentication bypasses and credential leakage.

Privacy Concerns with AI in Healthcare: 2025 Regulatory Insight

Healthcare has always been one of the toughest environments for maintaining privacy. Now add AI assistants, retrieval-augmented generation, and multimodal inputs like clinical images and voice notes. Sensitive information travels farther and faster than ever before, and the fallout from a single leak can be devastating, affecting clinical, legal, and reputational aspects. The question for 2025 is simple: how do we harness the advantages of AI without compromising private health data?

LimaCharlie Search Brings SIEM Experience to Open Beta

LimaCharlie is opening its advanced Search feature for beta testing. For current SecOps Cloud Platform users Search brings a SIEM-like experience to their integrated security stack. For those new to LimaCharlie, our SecOps platform centralizes security tooling and third-party resources while providing limitless cloud scaling and native multi-tenancy. We also provide a free rolling year of telemetry storage.

CrowdStrike Identifies Campaign Targeting Oracle E-Business Suite via Zero-Day Vulnerability (now tracked as CVE-2025-61882)

CrowdStrike is tracking a mass exploitation campaign almost certainly leveraging a novel zero-day vulnerability — now tracked as CVE-2025-61882 — targeting Oracle E-Business Suite (EBS) applications for the purposes of data exfiltration. CrowdStrike Intelligence assesses with moderate confidence that GRACEFUL SPIDER is likely involved in this campaign but cannot rule out the possibility that multiple threat actors have exploited CVE-2025-61882.