Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

How to Strengthen Cyber Resilience in an AI Era with Chris Cochran from SANS Institute [296]

On this episode of The Cybersecurity Defenders Podcast, we speak with Chris Cochran, Field CISO & Vice President of AI Security at SANS Institute, about how to navigate the future of AI risk and security strategy.

Application security in the age of AI with Farshad Abasi

Join us for this session of Defender Fridays as we explore application security in the age of AI with Farshad Abasi, CEO and Co-founder at Eureka DevSecOps. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

AI red teaming with John V.

Join us for this session of Defender Fridays as we explore AI red teaming with John V., AI risk, safety, and security specialist at the Institute for Security and Technology (IST). At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Logs & Lattes Episode 5: Top 10 Cybersecurity Threats Hybrid Teams Actually Face in 2026

Lean security teams operating in hybrid and regulated environments are not just fighting threats. They are fighting time. When evidence is scattered across email, identity, VPN endpoints, cloud, and network tools, even a solid detection means nothing if triage slows to a crawl. In this episode of Logs and Lattes, host Palmer Wallace and Graylog Solutions Architect Kyle Pearson break down the top ten security threats hybrid organizations are actually dealing with in 2026 and the single common failure behind most of them: fragmented telemetry that delays investigation when it matters most.

Ep. 47 - APT42 & Iran's AI Social Engineering: Deepfakes, Phishing & Hack-and-Leak

Iran’s APT42 — also known as Charming Kitten or Mint Sandstorm — is redefining social engineering with generative AI, deepfake voice cloning, and long-term phishing campaigns. In this episode of the Cyber Resilience Brief, we break down how Iranian state-sponsored threat actors are using AI-powered phishing, MFA fatigue attacks, credential harvesting, and hack-and-leak operations to target journalists, political campaigns, academics, and enterprise executives.

What You Need to Know about the Vikor Scientific Data Breach

Vikor Scientific is a molecular diagnostics company based in Charleston, South Carolina, that now operates under the brand name Vanta Diagnostics. The company owns KorGene, a molecular testing laboratory, and partners with KorPath, an anatomical pathology laboratory based in Tampa, Florida. These diagnostic facilities process sensitive medical testing for thousands of patients across the United States.

What You Need to Know about the CarGurus Data Breach

CarGurus is a major online automotive marketplace founded in 2006 and publicly traded on NASDAQ under the ticker symbol CARG. Headquartered in Cambridge, Massachusetts, the company operates one of the largest car shopping platforms in the United States, connecting millions of car buyers and sellers including both private individuals and dealerships.

LevelBlue Research: CIOs Recognize the Double-Edged Sword of AI

A Chief Information Officer’s (CIO) life is rarely simple or easy. Many are concerned about threat actors using AI to attack their organization, while at the same time attempting to convince their leadership to invest in AI as a defensive measure. A recent LevelBlue report Persona Spotlight: CIO, found that CIOs understand the threat, but many organizations are still behind the curve when it comes to certain aspects of their cyber defense.

5 AI Myths Exposing the Governance Gap

AI adoption isn’t slowing down. It’s accelerating, quietly, unevenly, and often outside formal control. To separate assumption from reality, CultureAI commissioned an independent research study of 300 senior technology, security, and risk leaders across North America and Europe. Respondents included CISOs, CIOs, CTOs, Data Protection Officers, and senior IT and security leaders across finance, healthcare, technology, legal, and professional services.