Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is Slopsquatting? The AI Package Hallucination Attack Already Happening

Typosquatting, registering a typoed version of a popular package and waiting for a developer to accidentally type and install the wrong package, has been around for a decade in npm. It’s nothing new— the registry has protections for it. Then AI came along and changed everything again. Slopsquatting is the new, AI flavor of typosquatting. Instead of betting on human typos, attackers bet on AI hallucinations, the package names that LLMs confidently recommend that don't actually exist.

Replacing Password Sharing in Slack With Secure Access Workflows

Many teams share credentials in Slack out of convenience, but this seemingly harmless habit introduces serious security and compliance risks. From accidental exposure to unauthorized access, sharing passwords in Slack can create major vulnerabilities across your organization. Keeper’s Slack workflow replaces risky password sharing in Slack with secure, Just-in-Time (JIT) access requests and approvals.

Notepad++ Supply Chain Attack Explained | CrowdStrike OverWatch Identified It Months Early

Your next software update could be weaponized. In this short breakdown, we examine how adversaries compromised the Notepad++ update mechanism to distribute malware and how CrowdStrike identified the activity four months before public disclosure.

Protecting Remote Endpoints: Backup Best Practices for a Distributed Workforce | BDRShield Webinar

YouTube Description With remote and hybrid work becoming the new normal, laptops and desktops are now the most vulnerable — and most overlooked — layer of business data protection. In this practical webinar, the BDRShield by Vembu team explains how IT teams and MSPs can protect remote endpoints reliably without disrupting users or increasing operational complexity. Speakers: Mani Subramanian Product Manager, Vembu Technologies What You’ll Learn.

From Chaos to Clarity: Your Guide to Understanding and Identifying CUI

The webinar "From Chaos to Clarity: Your Guide to Understanding and Identifying CUI" focused on controlled unclassified information (CUI) and its importance for government contractors. Megan Kennett, from Neosystems, hosted the session, which featured experts Reagan Edens, Jim Goebel, and David Carlino. The panel discussed the basics of CUI, including its definition, types, and the lifecycle approach to managing it. They emphasized the need for contractors to understand their contractual obligations and the authorized flow of CUI.

AI Security vs. Data Privacy: What you're getting WRONG (DAY -2) #shorts #ai

Day 2 at the AI Impact Summit was all about debunking myths. One major takeaway from our conversations today: Most leaders think AI security is just about stopping 'bad prompts.' But the real danger is exposing sensitive data to the model in the first place. If you aren’t sanitizing your data before it hits the AI, you’re leaving the door wide open. We’ve been showing attendees at Bharat Mandapam how Protecto bridges the gap between basic AI security and true Data Privacy.

Create a Tenant, Deploy Sigma Rules, and Enable GitHub Sync with @claude Code and LimaCharlie

This video shows how Claude Code handles a full tenant setup in a single workflow: creating a new organization, deploying Sigma rules, and enabling Git Sync, all in one run with LimaCharlie. Claude Code creates the organization, deploys the community Sigma rules available on the platform, and configures the Git Sync extension. That extension automatically creates a GitHub repository and syncs both the detection rules and the full tenant configuration to it, giving you version-controlled infrastructure from day one.