Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Top 3 Threat Actors Targeting the Insurance Industry

Threat actors target the insurance industry for a simple reason: insurers sit on concentrated volumes of sensitive personal data, financial records, and in many cases health information, all of which are highly valuable for resale on dark markets. Claims systems, customer portals, broker platforms, and third-party service providers also present a complex attack surface that offers threat actors multiple paths into the business.

Protect OpenShift Virtualization Before Your MTV Migration Wave Hits

A practical guide to VM-aware data protection for VMware-to-OpenShift migrations VMware exits rarely fail because engineers cannot move bits. They fail because the organization discovers, mid-flight, that it cannot reliably recover those bits once they land somewhere new.

Complete Guide to Understanding CMMC Compliance

Cybersecurity requirements for companies in the defense supply chain have entered a decisive enforcement phase. The Department of Defense has moved beyond self-attestation and toward verifiable, contract-bound cybersecurity standards. The Cybersecurity Maturity Model Certification (CMMC), now plays a central role in determining which organizations are eligible to work with the DoD. CMMC establishes three compliance levels, each tied directly to the sensitivity of the data an organization handles.

How Companies Can Protect Against Third-Party Risk in 2026

As organizations move deeper into cloud ecosystems, automation, AI integrations, and global supply chains, one truth becomes increasingly clear: In 2026, third-party risk is not just an IT concern. It is a business continuity concern, a regulatory concern, and in many industries, a board-level concern. From software vendors and cloud providers to managed services, payment processors, contractors, and niche business tools, every external connection introduces potential exposure.

LimaCharlie + @claude Code: Admin Tasks, MITRE Coverage, and EDR Detections [Demo]

Claude Code runs directly inside the LimaCharlie UI, connecting to the MCP server and loading the skills needed to execute commands across your environment. In this video, you'll see it in action for common administrative tasks: identifying organizations and their IDs, pulling sensor counts for a specific org, and getting a full breakdown of containers by type. SOC managers can query this information conversationally rather than navigating multiple menus or writing custom scripts.

150+ FAKE law firm websites found in AI cloning scam #cybersecurity #ai #podcast

In this week's Intel Chat, Christopher Luft and Matt Bromiley discuss how attackers used AI to clone over 150 law firm websites, targeting fraud victims under the guise of offering legal assistance to recover lost funds. Chris points out how easy this has become with AI tools. Attackers can quickly clone a website, host it at a legitimate-looking domain, and start harvesting information. The episode also covers Russian cyber operations targeting the defense industrial base, Team PCP's campaign compromising 60,000+ servers, and exposed OLAMA AI infrastructure.

Ep. 46 - Blueprint Thieves: Inside Iran's Industrial Espionage Machine

In this episode of _The Cyber Resilience Brief_, we break down the modern reality of *Iranian cyber warfare and industrial espionage*. Host Tova Dvorin and offensive security engineer Adrian Culley analyze the tactics, techniques, and procedures (TTPs) of *APT33, OilRig (APT34), and MuddyWater* — three of the most active Iranian state-sponsored threat actors targeting *energy, aviation, manufacturing, government, and critical infrastructure*.

Your Cyber Resilience Strategy for Unknown Threats

Global cyber attacks increased by approximately 38% in 2025, with organisations experiencing an average of over 1,900 attacks per week. To thrive and survive in this dynamic environment, businesses must move beyond mere security and embrace a holistic strategy of cyber resilience.