Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Key Lessons from the Major Ransomware Attacks in Recent Months

The biggest ransomware attacks of 2025 have shown that this threat remains critical for organizations across all sectors. Incidents such as the Change Healthcare attack, which compromised the data of nearly 190 million individuals, and the attack on Jaguar Land Rover, which forced production lines to halt and caused losses amounting to hundreds of millions of dollars, show that a single incident can impact both operational continuity and information confidentiality.

How likely is a man-in-the-middle attack?

Security vendors love the man-in-the-middle attack. It’s the boogeyman of every TLS marketing page. Some shadowy figure intercepting your traffic, reading your secrets, stealing your data. A man-in-the-middle attack is when an attacker positions themselves between two parties on a network to intercept the traffic flowing between them. In the context of TLS, that means an attacker who can present a valid certificate can read everything in plaintext and proxy it on to the real server.

Intel Chat: DoppelBrand, Android malware Keenadu, attackers expand AI use & AI-driven threats [295]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Claude Code Summarizes Host Activity in LimaCharlie

Watch Claude Code analyze a week of activity for a specific host in LimaCharlie. The agent resolves the correct sensor, queries recent detections, collects event telemetry, analyzes process and network behavior, and produces a concise activity profile. Security analysts can quickly understand host behavior patterns without manually reviewing raw telemetry logs.

Claude Code Security: A Welcome Evolution in the Remediation Loop

AI accelerates discovery — but enterprise trust still depends on deterministic validation, remediation automation, and governance at scale. Last Friday, Anthropic launched Claude Code Security, powered by Opus 4.6, inside Claude Code. The demo is impressive: Frontier AI reasoning scanned open source codebases and surfaced over 500 previously unknown high-severity vulnerabilities — including subtle heap buffer overflows that had survived decades of expert review and fuzzing.

Securing Every Layer: How LevelBlue's Full-Stack Testing Protects Your Product and Reputation

Connected products, whether IoT, IIoT, embedded, mobile, or other such devices, serve to either strengthen or undermine an organization’s security posture and reputation. As device ecosystems grow in complexity, manufacturers must secure embedded hardware, firmware, over-the-air (OTA) update mechanisms, companion mobile applications, cloud services and APIs, and RF interfaces. Each layer introduces distinct attack surfaces that adversaries actively target.

From Prompt to Production: The New AI Software Supply Chain Security

Listen to a NotebookLM podcast version of the blog: When Anthropic announced Claude Code’s new security scanning capabilities, following the announcement of OpenAI’s Aardvark, it marked an important moment for the industry. For the first time, expert-level security review is becoming embedded directly into the act of writing code. Subtle, context-dependent vulnerabilities can now be flagged as they are created. Zero-days can potentially be remediated before they ever make it into a build.

Why Your SOC is Blind to Your Biggest Attack Surface (And How to Fix It)

In many organizations, there is a dangerous unspoken rule: The SOC handles endpoints and networks; Engineering handles APIs. This silo creates a massive blind spot. We recently spoke with the Senior Manager of Security Engineering at a major insurance provider, who described this exact pain point.

Xona Platform v5.5 is Now Available

TL;DR Xona Platform v5.5 strengthens remote access across distributed OT environments. It introduces session resilience to maintain continuity during network interruptions, expands centralized governance for more consistent access control, and enhances support for constrained or disconnected deployments. In critical infrastructure environments, remote access is not abstract. It supports maintenance windows, emergency response, vendor coordination, and day-to-day operations across distributed sites.