Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Claude Code Security: Why Cyber Investors are Panicking

Artificial intelligence, cybersecurity, Claude Code Security, AI security tools and cybersecurity stocks are dominating headlines, but is AI really replacing security professionals? In this Razorwire Raw episode, Jim breaks down the market panic following Anthropic’s Claude Code Security launch, why cybersecurity investors reacted so strongly and what AI can actually do today versus industry hype.

Detect OPERATOR PANDA at the Edge with Falcon Adversary Overwatch

CrowdStrike Falcon Adversary Overwatch: ► Detect adversaries hiding in your blind spots. Falcon Adversary Overwatch exposes threats targeting network edge devices—firewalls, routers, and infrastructure traditional security tools can’t see. Watch the demo to see how CrowdStrike detects OPERATOR PANDA in real time and stops edge-driven intrusions that quickly turn into credential theft and identity abuse before they escalate.

React2Shell (CVSS 10.0): Patch React & Next.js NOW | Unauth RCE Explained

A maximum-severity vulnerability is hitting React Server Components - and if you're running Next.js, you may be vulnerable by default. React disclosed CVE-2025-55182, nicknamed React2Shell, an unauthenticated remote code execution (CVSS 10.0) affecting React Server Components via the Flight protocol. Next.js tracks downstream exposure as CVE-2025-66478: That means internet-wide scanning is likely. Who’s affected?

Code Mode: Giving AI Agents an Entire API in 1,000 Tokens (With Demos)

In this episode of This Week in NET, host João Tomé is joined by Matt Curry to break down Code Mode: a way to give AI agents access to the entire Cloudflare API (2,500+ endpoints) using two tools and roughly ~1,000 tokens of context. Instead of exposing thousands of individual tools (which quickly becomes expensive and brittle), Code Mode lets the model write JavaScript to search and execute against a compact API context. The result is massive compression, lower cost, and better performance.

How to Configure Jira OAuth/OIDC SSO Integration with Keycloak | Step-by-Step Guide

Managing user authentication across multiple platforms can be a challenge. By integrating Keycloak with Jira using the miniOrange OAuth/OIDC SSO plugin, you can centralize your identity management and provide a secure, seamless login experience for your team. In this video, we walk you through the full configuration process: from setting up a new Client in your Keycloak Realm to finalizing the OAuth settings within Jira. You’ll see how to handle the Root URL, Valid Redirect URIs, and how to map the Client Secret to get your SSO running instantly.

Stopping Real-World Attacks: Lessons from the Cyber Frontlines

We went live to break down insights from 661 real‑world incidents remediated by Sophos X‑Ops, as detailed in the Sophos Active Adversary Report 2026. Host Susie Evershed and Sophos Senior Incident Response Analyst Hilary Wood unpacked the key trends shaping today’s threat landscape, including the continued dominance of identity‑driven attacks and the prevention steps that still made the biggest difference.