Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Can You Really Pair Program with AI? (Aider & Cohere)

A new wave of AI development tools is changing how we write code, but can AI truly replace a human coding partner? In this video, we explore the capabilities of Aider and Cohere, two tools built to support real-time, conversational pair programming. We’ll break down how they work, where they shine, and the surprising limitations that came up during testing. Whether you're an experienced developer or simply curious about the future of coding, this deep dive will give you a clear picture of where AI-assisted programming stands today.

#206 - The AI Threat Landscape Report w Eoin Wickens, Director of Threat Intelligence at HiddenLayer

On this episode of the Cybersecurity Defenders Podcast we dive into the AI Threat Landscape report with Eoin Wickens, Director of Threat Intelligence at HiddenLayer. Eoin specializes in AI security, threat research, and malware reverse engineering. Eoin has authored numerous articles on AI security, co-authored a book on cyber threat intelligence focusing on Cobalt Strike, and has spoken at conferences such as DEF CON AI Village, BSides San Francisco, LABScon, and 44CON. He also delivered the 2024 SCORED opening keynote.

Brivo Access: How to Create Users and Assign Credentials

A User is any person who has been given a credential and generally has access to at least one door. Users are assigned to Groups, which are assigned door and device permissions. This video details how to create a new user, assign to a group or groups, and assign various credential types. Explore the future of security and smart technology with Brivo. Our content delves into innovative solutions that empower businesses and individuals to create safer, more connected environments.

Brivo Access: How to Add Cards

A card is a type of access control credential that provides a secure and auditable method for verifying a user's authorization to enter restricted spaces. This how-to video will provide the steps needed to add or remove cards from your Brivo Access account. Explore the future of security and smart technology with Brivo. Our content delves into innovative solutions that empower businesses and individuals to create safer, more connected environments.

April 07, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: North Korean Fake Workers Expand to European Organizations Kroll has previously reported on the growing scale of the DPRK IT worker fraud scheme where the U.S. was a key focus, with some Southeast Asian countries also seeing fraudulent activity. It has since been reported that an increase in active operations in Europe has been observed—a notable expansion since its beginnings in 2024.

Github Actions Supply Chain Attacks - Episode 324 - The 443 Podcast

This week on, Corey and Marc discuss a recent cascading supply chain attack involving multiple Github actions workflows that nearly succeeded in compromising a popular Coinbase application. Before that, they discuss a novel way to download malware onto an endpoint by abusing a web browser's caching feature. Additionally, they cover an FBI alert on file converter malware scams.

Lucid, the Phishing-as-a-Service Platform - The 443 Podcast - Episode 325

This week on the podcast, we discuss a recent threat intelligence report on the Chinese Phishing-as-a-Service platform Lucid. Before that, we cover the alleged Oracle Cloud breach before reviewing the Singapore Shared Responsibility Framework, designed to combat financial scams.