Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Preventing AI Agents from Going Rogue: Zenity Collaborates with Microsoft Copilot Studio to Deliver Inline Protection Against Malicious Behavior

AI agents are autonomous, powerful, and deeply embedded in how modern businesses operate. From rerouting customer support emails to accessing critical business tools like email and CRM systems, agents are transforming workflows across departments. As of Microsoft’s Q1 2025 earnings report, over 230,000 organizations, including 90% of the Fortune 500, are using Microsoft Copilot Studio to build custom agents for a huge variety of tasks.

What To Do if Your Credit Card Information Is on the Dark Web

Stolen card details can lead to fraud, unauthorized purchases and even identity theft. In this video, we’ll explain how your information may have ended up on the dark web, what steps to take if your card is compromised and how to keep your financial data safe in the future.

Intel Chat: Salt Typhoon, Scattered LapSus Hunters, WhatsApp compromise & AI-assisted attack [245]

Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Would You Like Data Leaks With That?

It’s been a rough few weeks for burger chains. First, McDonald’s McHire chatbot was caught serving up candidate data through insecure APIs. Then Restaurant Brands International (RBI), home of Burger King, Tim Hortons, and Popeyes, had its APIs flame-broiled by attackers who discovered they could generate tokens without authentication, escalate privileges, and even eavesdrop on live drive-thru audio. When APIs become the secret sauce, leaving them unprotected is a recipe for disaster.

Using AI in Security Operations: A Practical Checklist for the Modern SOC

AI is transforming how security operations centers (SOCs) work, but the hype can outpace the reality. You don’t need to build custom models or deploy cutting-edge platforms to benefit. Chances are, you already have AI-powered capabilities in your SIEM, SOAR, or security data platforms. The question is: Are they doing anything useful? This practical playbook lays out six key priorities to increase productivity and effectiveness while maintaining control.

LimaCharlie's AI: What It Does

Sr. Technical Content Strategist Everyone advertises AI, how does LimaCharlie use it? If you are not exhausted by the relentless AI hype cycle by now, your resilience is commendable. Our industry is awash in AI marketing that is an inch deep and a mile wide*. Everyone claims to have AI, almost no one will explain how it works. At LimaCharlie transparency is a core value. You see it in our high-visibility security platform and publicly available pricing structure.