Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How AI is revolutionizing third-party risk assessments

Enterprises rely heavily on third-party vendors for a vast spectrum of critical services. From IT support and supply chain management to specialized consulting and cybersecurity, the reliance on external partners has increased significantly. With this reliance comes the inherent risk that these vendors may pose to enterprise operations, reputation, and regulatory compliance.

Ep 6: The Gunslingers

During China’s pseudo-cyber-hiatus, the PRC’s hacking operations get a major overhaul. CCP leadership moves responsibility away from the sloppy, brazen hackers at the People’s Liberation Army to the far more stealthy, and strategic, Ministry of State Security. Gone are the “most polite” hackers in the digital world. Here to stay are the gunslingers – the elite of the elite in their field. In Episode 6, host and former New York Times cybersecurity reporter, Nicole Perlroth lays out what it looked like as China’s hackers went underground… and what we missed in Eastern Europe as they did.

Proton66 Part 1: Mass Scanning and Exploit Campaigns

Trustwave SpiderLabs continuously tracks a range of malicious activities originating from Proton66 ASN, including vulnerability scanning, exploit attempts, and phishing campaigns leading to malware infections. In this two-part series, SpiderLabs explores the malicious traffic associated with Proton66, revealing the extent and nature of these attacks.

Netwrix Launches the First MCP Server to Bring LLMs into Data Security!

Netwrix announces first MCP server to harness the power of Netwrix + LLMs for data security. Today, we're open-sourcing our first MCP server – and it’s powering up Netwrix Access Analyzer with conversational AI to help customers assess and remove sensitive data exposures. Netwrix is first to market in the data security security industry with an MCP server, enabling you to bring your favorite Generative AI tool to the critical task of securing your data.

April 14, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: Fortinet Warns of Active Exploitation of Known Vulnerabilities Fortinet has identified a post-exploitation technique used by threat actors targeting known, unpatched vulnerabilities in FortiGate devices. The threat actor leveraged a symbolic link trick to maintain read-only access to FortiGate devices, even after the original access vector was remediated.

Getting Started with Brivo Access

Welcome to your beginner's guide to Access, Brivo's powerful cloud-based access control platform! Whether you're a new user, installer, or just getting familiar with Brivo, this tutorial walks you through the essentials to get you up and running quickly. Explore the future of security and smart technology with Brivo. Our content delves into innovative solutions that empower businesses and individuals to create safer, more connected environments.

Claude AI BLEW MY MIND! (Board Game Challenge)

In this video, I challenge Claude AI to a head-to-head match in the board game King of Tokyo Duel. I walk the AI through the rules, give it everything it needs to understand how to play, and then we battle it out! Claude picks up the game shockingly fast — its strategy, decision-making, and logic were next-level. I was seriously mind-blown at how intelligent it was… Should we put this to the test with other AI's like ChatGPT?