Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Project Glasswing - The 443 Podcast - Episode 366

This week on the podcast, we discuss Anthropic's Project Glasswing and what the Claude Mythos announcement means to cybersecurity. After that, we cover FrostArmada, a campaign from a Russian GRU-backed threat actor that has compromised tens of thousands of home networking routers. Finally we end with a chat about Google Chrome 146's new feature to protect against session hijacking.

Discover Walkthrough Redux - Tanium Tech Talks #159

What’s really on your network? Would you know if a rogue device was plugged in? Join us as Nash King breaks down how Tanium Discover works today - and how to use it effectively in real environments. You'll learn about: How Discover identifies network interfaces How to use different scan types IPv4 vs. IPv6 discovery (and why it matters) Using satellites to discover remote or unmanaged subnets Centralizing network definitions and exclusions Using labels to categorize interfaces.

82% of Attacks Skip Malware Entirely

27 seconds. That’s how fast an adversary can move to your critical systems. In this clip, you’ll learn: How adversaries blend in using everyday admin tools Why traditional, reactive security models fall behind What makes modern intrusions so hard to detect Watch the full video to see how teams are shifting to proactive hunting.

Sophos Firewall: Configuration Studio

An overview of the new Sophos Firewall Configuration Studio, the newest version of the Firewall Configuration Viewer. This standalone, browser-based tool converts firewall configurations into a clear, human-readable format, enhancing your viewing, auditing, documentation, and comparison capabilities. All data is processed locally, so your information remains 100% private. Ask questions and get expert answers in the Sophos Community.

Exposure Summary Agent: Demo Drill Down

Vulnerability data is often fragmented, leaving security teams to interpret scattered details across sources. Without clear context, patching decisions are driven by severity scores instead of actual risk. In this demo drill down, we showcase the Exposure Summary Agent within Falcon Exposure Management. You’ll see how AI-enhanced vulnerability descriptions consolidate exploit methods, affected systems, and attacker intent into a single, structured view—eliminating the need to piece together raw data.

See Falcon Secure Access in Action

Adversaries are targeting the browser — hijacking sessions, stealing credentials, and exploiting gaps traditional tools can’t see. Watch how CrowdStrike's Falcon Secure Access delivers zero trust runtime protection directly in the browser, combining secure access with deep, real-time visibility and control over user activity. Subscribe and stay updated!

"What are wheels without an engine?"

At, George Kurtz and Dan Ives used a racing analogy to break down AI and cybersecurity. “The engine is the data… we are creating the data,” George explained. “If you’re a net data creator… you have a massive advantage.” In an AI-driven world, there will be two types of companies: those that create proprietary data and those that don’t.

Understanding how attackers think & how you avoid threats with Terry Bradley, Mile High Cyber [311]

Terry Bradley, Founder and President of Mile High Cyber, shares how you can uncover vulnerabilities and strengthen your organization's defenses with expert penetration testing and security assessments.