Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

GitGuardian - protect your enterprise against leaked secrets and mismanaged identities.

We allow organizations to discover and remediate exposed Secrets as well as manage NHIs lifecycle across both their internal network and public perimeter (for ex over permissioned, stale secrets, secrets in multiple vaults…). Our unrivaled secrets detection engine is trained and backtested in real-time against +5Bn commits and used by more than 600k developers, it is also the n°1 app on the GitHub Market place. GitGuardian integrates natively with the SDLC (GitHub, Gitlab…) but also with other data sources such as Jira, Slack, ServiceNow, Docker, as secrets leak in all these environments.

Adversary Tradecraft: Apache Tomcat RCE

CVE-2025-24813 is a critical vulnerability (CVSS base score of 9.8) affecting Apache Tomcat, a widely used open-source web server and servlet container. This issue affects Apache Tomcat: In this blog, we’ll simulate an attack and look at the activity within Graylog. Throughout the analysis, and at the conclusion of the post, we’ll provide practical threat-hunting and detection strategies you can implement in your own environments.

Ep 5: A Cyber Detente

Every U.S. administration, dating back to President H.W. Bush has struggled to address the threat of Chinese trade theft. But a growing sense of urgency kicks in as American businesses start hemorrhaging trade secrets and entire product lines start vanishing to Chinese copycats. Just as the Obama Administration is set to do something about it, Edward Snowden shifts the narrative back onto the United States.

Initial Access Brokers Explained

Initial access brokers (IABs) form a key part of the cybercriminal ecosystem. They facilitate access for ransomware groups, data leakers, and advanced persistent threat groups (APTs) into corporate networks. They are highly specialised, professional, and operate in an established, lucrative market which is often characterised by rigid rules and conventions. Every ransomware incident or data breach begins with initial access, following the reconnaissance phase of an attack.

The Modern Kill Chain: An On-Demand Session from FCW, NextGov and Lookout

As federal agencies shift beyond perimeter defenses, cyber threats are evolving—targeting identity, data, and mobile devices at the front line of today’s attacks, which can now infiltrate systems and exfiltrate data in minutes rather than months. While Zero Trust provides the foundation for defense, starting with a simple mobile threat defense solution can break down modernization barriers. Learn how a mobile-first approach strengthens Zero Trust, accelerates modernization, and safeguards federal networks from the modern kill chain.

Can You Really Pair Program with AI? (Aider & Cohere)

A new wave of AI development tools is changing how we write code, but can AI truly replace a human coding partner? In this video, we explore the capabilities of Aider and Cohere, two tools built to support real-time, conversational pair programming. We’ll break down how they work, where they shine, and the surprising limitations that came up during testing. Whether you're an experienced developer or simply curious about the future of coding, this deep dive will give you a clear picture of where AI-assisted programming stands today.

#206 - The AI Threat Landscape Report w Eoin Wickens, Director of Threat Intelligence at HiddenLayer

On this episode of the Cybersecurity Defenders Podcast we dive into the AI Threat Landscape report with Eoin Wickens, Director of Threat Intelligence at HiddenLayer. Eoin specializes in AI security, threat research, and malware reverse engineering. Eoin has authored numerous articles on AI security, co-authored a book on cyber threat intelligence focusing on Cobalt Strike, and has spoken at conferences such as DEF CON AI Village, BSides San Francisco, LABScon, and 44CON. He also delivered the 2024 SCORED opening keynote.