Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Initial Access Brokers Explained

Initial access brokers (IABs) form a key part of the cybercriminal ecosystem. They facilitate access for ransomware groups, data leakers, and advanced persistent threat groups (APTs) into corporate networks. They are highly specialised, professional, and operate in an established, lucrative market which is often characterised by rigid rules and conventions. Every ransomware incident or data breach begins with initial access, following the reconnaissance phase of an attack.

The Modern Kill Chain: An On-Demand Session from FCW, NextGov and Lookout

As federal agencies shift beyond perimeter defenses, cyber threats are evolving—targeting identity, data, and mobile devices at the front line of today’s attacks, which can now infiltrate systems and exfiltrate data in minutes rather than months. While Zero Trust provides the foundation for defense, starting with a simple mobile threat defense solution can break down modernization barriers. Learn how a mobile-first approach strengthens Zero Trust, accelerates modernization, and safeguards federal networks from the modern kill chain.

Can You Really Pair Program with AI? (Aider & Cohere)

A new wave of AI development tools is changing how we write code, but can AI truly replace a human coding partner? In this video, we explore the capabilities of Aider and Cohere, two tools built to support real-time, conversational pair programming. We’ll break down how they work, where they shine, and the surprising limitations that came up during testing. Whether you're an experienced developer or simply curious about the future of coding, this deep dive will give you a clear picture of where AI-assisted programming stands today.

#206 - The AI Threat Landscape Report w Eoin Wickens, Director of Threat Intelligence at HiddenLayer

On this episode of the Cybersecurity Defenders Podcast we dive into the AI Threat Landscape report with Eoin Wickens, Director of Threat Intelligence at HiddenLayer. Eoin specializes in AI security, threat research, and malware reverse engineering. Eoin has authored numerous articles on AI security, co-authored a book on cyber threat intelligence focusing on Cobalt Strike, and has spoken at conferences such as DEF CON AI Village, BSides San Francisco, LABScon, and 44CON. He also delivered the 2024 SCORED opening keynote.

Brivo Access: How to Create Users and Assign Credentials

A User is any person who has been given a credential and generally has access to at least one door. Users are assigned to Groups, which are assigned door and device permissions. This video details how to create a new user, assign to a group or groups, and assign various credential types. Explore the future of security and smart technology with Brivo. Our content delves into innovative solutions that empower businesses and individuals to create safer, more connected environments.

Brivo Access: How to Add Cards

A card is a type of access control credential that provides a secure and auditable method for verifying a user's authorization to enter restricted spaces. This how-to video will provide the steps needed to add or remove cards from your Brivo Access account. Explore the future of security and smart technology with Brivo. Our content delves into innovative solutions that empower businesses and individuals to create safer, more connected environments.

April 07, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: North Korean Fake Workers Expand to European Organizations Kroll has previously reported on the growing scale of the DPRK IT worker fraud scheme where the U.S. was a key focus, with some Southeast Asian countries also seeing fraudulent activity. It has since been reported that an increase in active operations in Europe has been observed—a notable expansion since its beginnings in 2024.

The Fastest Way to Secure Your APIs? We've Got That Covered with CrowdStrike

APIs are the backbone of modern apps, but they also introduce some serious security risks. Attackers are constantly on the lookout for vulnerable APIs, shadow APIs, zombie APIs, and exposed sensitive data—all of which are tough to track if you don’t have the right tools in place. That’s why we’ve teamed up with CrowdStrike to make API security easier, faster, and more powerful than ever.