Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What To Do if Your Credit Card Information Is on the Dark Web

Stolen card details can lead to fraud, unauthorized purchases and even identity theft. In this video, we’ll explain how your information may have ended up on the dark web, what steps to take if your card is compromised and how to keep your financial data safe in the future.

Intel Chat: Salt Typhoon, Scattered LapSus Hunters, WhatsApp compromise & AI-assisted attack [245]

Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Would You Like Data Leaks With That?

It’s been a rough few weeks for burger chains. First, McDonald’s McHire chatbot was caught serving up candidate data through insecure APIs. Then Restaurant Brands International (RBI), home of Burger King, Tim Hortons, and Popeyes, had its APIs flame-broiled by attackers who discovered they could generate tokens without authentication, escalate privileges, and even eavesdrop on live drive-thru audio. When APIs become the secret sauce, leaving them unprotected is a recipe for disaster.

Using AI in Security Operations: A Practical Checklist for the Modern SOC

AI is transforming how security operations centers (SOCs) work, but the hype can outpace the reality. You don’t need to build custom models or deploy cutting-edge platforms to benefit. Chances are, you already have AI-powered capabilities in your SIEM, SOAR, or security data platforms. The question is: Are they doing anything useful? This practical playbook lays out six key priorities to increase productivity and effectiveness while maintaining control.

LimaCharlie's AI: What It Does

Sr. Technical Content Strategist Everyone advertises AI, how does LimaCharlie use it? If you are not exhausted by the relentless AI hype cycle by now, your resilience is commendable. Our industry is awash in AI marketing that is an inch deep and a mile wide*. Everyone claims to have AI, almost no one will explain how it works. At LimaCharlie transparency is a core value. You see it in our high-visibility security platform and publicly available pricing structure.

How to deploy NAKIVO Backup & Replication in multi-tenant mode

You can deploy NAKIVO Backup & Replication in multi-tenant mode to centrally manage backups for multiple customers or business units while ensuring data isolation, scalability and cost efficiency. Watch this video to learn to install the NAKIVO solution in multi-tenant mode on Windows and on Linux.