Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Detect OPERATOR PANDA at the Edge with Falcon Adversary Overwatch

CrowdStrike Falcon Adversary Overwatch: ► Detect adversaries hiding in your blind spots. Falcon Adversary Overwatch exposes threats targeting network edge devices—firewalls, routers, and infrastructure traditional security tools can’t see. Watch the demo to see how CrowdStrike detects OPERATOR PANDA in real time and stops edge-driven intrusions that quickly turn into credential theft and identity abuse before they escalate.

Maximizing Your Microsoft Security Stack with LevelBlue

Microsoft has made significant gains in the cybersecurity market, earning top rankings from leading analyst firms such as IDC and Forrester for its endpoint protection and threat detection and response capabilities. Solutions like Microsoft Defender XDR and Microsoft Sentinel provide powerful, integrated security across endpoints, identities, email, cloud workloads, and data. But technology alone does not deliver outcomes.

CVE-2026-20127: In-Depth Analysis of the Cisco Catalyst SD-WAN Authentication Bypass Vulnerability

Software-defined networking (SD-WAN) has transformed enterprise infrastructure, enabling dynamic connectivity between sites with centralized management and control. But when the control plane itself becomes vulnerable, network integrity is no longer a given.

Springing into a new round of YDWWT!

When we think of spring, we think of things in bloom; flowers, ideas, maybe even hope for the snow to melt here in our US headquarters Boston, MA. But regardless of the snow, we've chosen to embrace the idea of spring and letting your workflow creativity grow! What better way to let that creativity shine than with another round of You Did WHAT With Tines?! (YDWWT) For the Spring 2026 round of YDWWT, we want to know what your team can achieve with a Tines workflow.

Agentic AI Security: From Threat Intelligence to Live Detections in Minutes

LimaCharlie's SecOps Cloud Platform is built around a simple idea: everything connects via API. That includes AI. Rather than locking you into a proprietary and limited AI SOC, LimaCharlie lets you bring your own LLM and put it to work directly inside your security environment. With LimaCharlie, AI can execute operations across your detections, sensors, and integrations. Because LimaCharlie operates entirely via API, every AI action is transparent and auditable.

Black Hat Europe 2025: Lessons from the NOC

With the holiday season all wrapped up (pun definitely intended), I finally have time to sit down and digest what we saw in the network traffic at Black Hat Europe 2025 while working alongside the other Network Operations Center (NOC) partners: Arista, Cisco, Jamf, and Palo Alto Networks. As usual, there is a mix of the expected, a dash of the unexpected, and some lessons for newcomers and greybeards alike. Let’s get into it.

React2Shell (CVSS 10.0): Patch React & Next.js NOW | Unauth RCE Explained

A maximum-severity vulnerability is hitting React Server Components - and if you're running Next.js, you may be vulnerable by default. React disclosed CVE-2025-55182, nicknamed React2Shell, an unauthenticated remote code execution (CVSS 10.0) affecting React Server Components via the Flight protocol. Next.js tracks downstream exposure as CVE-2025-66478: That means internet-wide scanning is likely. Who’s affected?

Best Security for K8s Clusters: A Runtime-First Approach

Why does traditional Kubernetes security fall short? Static scanners flag thousands of CVEs but can’t tell you which ones are actually loaded into memory and exploitable—only about 15% are loaded at runtime. Traditional tools also create siloed visibility, with CSPM, vulnerability scanners, and EDR each seeing only one slice of your environment. This makes it impossible to spot lateral movement or connect events across cloud, cluster, container, and application layers.