Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The SOC Analyst Agent: Bring an Agentic approach to work with your SOC team

For years, security teams have dealt with the challenges of alert fatigue, endless tools and data sources, and constant context switching. But, so far, we haven’t been able to significantly improve it with traditional tools. However, new agentic approaches can start providing improved gains. This begins to change the way SOC teams operate and approach managing their talent.

CVE-2025-40602: SonicWall Releases Fix for SMA1000 Privilege Escalation Zero-Day Under Active Attack

On December 17, 2025, SonicWall released fixes for an actively exploited medium-severity zero-day vulnerability in the SonicWall SMA1000 Appliance Management Console (AMC), tracked as CVE-2025-40602. The vulnerability allows local threat actors to escalate privileges due to insufficient authorization in the SMA1000 AMC and does not affect SSL VPN functionality on SonicWall firewalls.

Intel to Action: How Integrated Threat Intelligence Platforms Transform the Modern SOC

Today’s adversaries are fast, distributed, and increasingly coordinated. Yet many SOCs remain reactively trapped in fragmented tools, endless alert queues, and growing pressure from executives to prove not just security, but resilience. It’s no longer enough to collect threat feeds or stand up a threat intel team. What’s needed is integrated intelligence—curated, contextualized, and operationalized—so your team can detect sooner, respond faster, and adapt continuously.

BlackGirlsHack: Building a community and impactful legacy with Rebekah Skeete [277]

On this episode of The Cybersecurity Defenders Podcast we speak with Rebekah Skeete, Executive Director and CEO of BlackGirlsHack Foundation. Rebekah dives into how BGH is helping to increase diversity in cybersecurity by bridging the gap between what is taught in educational institutions and what is necessary for careers in cybersecurity.

SecurityScorecard CISO Steve Cobb as Cyber Santa's 2025 Naughty and List 2025

AI dominated headlines this year and threat actor groups made bold moves in 2025. From threat actors like Imperial Kitten and scammers using tools like Sora AI to mimc real human voices to Congressional action on the PILLAR act and a $50 billion rural healthcare investment from the U.S. government, there are a lot of moments this year that make up Cyber Santa's Naughty and Nice List for 2025.

Modern Exposure Management Is About Outcomes, Not Alerts

Modern exposure management has evolved beyond vulnerability scanning and alert volume into a discipline focused on measurable risk reduction. As the exposure management market matures, security leaders are adopting cyber exposure management platforms that unify signals across vulnerability, cloud, application, and attack surface tools to prioritize what truly matters.

Secret Scanning: A Critical Practice for Protecting Sensitive Data in Code

With the rise of CI/CD pipelines, cloud-native development, and globally distributed teams, sensitive credentials like API keys, tokens, and database passwords often slip into source code. Sometimes accidentally, sometimes under pressure to deploy fast. This is not a rare mishap. A recent study found that 34% of API security incidents involve sensitive data exposure. And according to Cyble, over 1.5 million.env files containing secrets have been discovered in publicly accessible environments.

CVE-2025-66675: Apache Struts DoS Vulnerability Leads to Disk Exhaustion

A newly disclosed denial-of-service vulnerability, CVE-2025-66675, affects a wide range of Apache Struts 2 versions and poses a serious availability risk for applications that handle file uploads. While the EPSS score is 0.05%, indicating a low probability of exploitation in the next 30 days, the vulnerability still represents a high availability risk for exposed and unpatched environments.

Simplifying Identity Lifecycle Management With Keeper

Managing user access across the entire employee lifecycle has become increasingly complex for modern IT and security teams. From provisioning new hires and modifying existing permissions during role changes to quickly deprovisioning departing employees, organizations must maintain granular access controls without disrupting operations. To keep up with the growth of hybrid and remote work, modern Identity Lifecycle Management (ILM) is essential for organizations to mitigate identity-based security risks.