Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Intel Chat: Russian cyber ops, Sygnia, Ollama & TeamPCP [293]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Monitoring for Law Firms: Data Security & Ethics Guide

Law firms don’t monitor employees because they’re “worried about productivity.” They monitor because one mistake can expose privileged matter files, trigger breach notifications, derail litigation strategy, and permanently damage client trust, especially in a hybrid work model. External attackers are still a threat.

Is AI dangerous?

AI is everywhere—writing emails, creating videos, even cloning voices. But artificial intelligence also comes with real risks, including privacy concerns, deepfakes, and smarter online scams. Artificial intelligence learns by spotting patterns in massive amounts of data—and that power can be misused. AI tools may collect personal information, create realistic fake content, or help scammers craft messages that look completely legit.

RFP Essentials for Account Takeover Fraud Solutions: A Procurement Guide

The digital landscape is currently witnessing an industrialization of fraud. Legacy defenses, once considered standard, are now struggling to keep pace with sophisticated attackers who operate with the speed of AI. For enterprises, the Request for Proposal (RFP) process is no longer just a bureaucratic hurdle. It is a critical opportunity to filter out reactive “band-aid” fixes and identify account takeover (ATO) fraud solutions that provide preemptive protection.

BygoneSSL happened to us

A few months ago I wrote about BygoneSSL and the 1.5 million domains with valid certificates owned by someone else. Domains change hands but certificates don’t know. The old owner keeps their private key, and the certificate keeps working. It’s an industry problem, but it turns out it’s our problem too. We purchased certkit.dev for internal development and demos.

NIS2 vs DORA: Your Complete EU Cybersecurity Compliance Guide

By January 2025, over 160,000 EU organizations became subject to new cybersecurity regulations—NIS2, DORA, or both. If you operate in the EU or serve EU clients, you’re likely affected. This guide clarifies which regulations apply to you and what you must do to comply. Contents hide At-a-Glance Comparison Is Your Organization Affected? Question 1: Where Do You Operate? Question 2: What Sector Are You In? Question 3: What’s Your Company Size? What is NIS2?

Poland's Energy Sector Attack is a Wake-Up Call for Improving Edge Security

The Cybersecurity Infrastructure Security Agency (CISA) issued an alert this week based on an attack that struck Poland’s energy sector in late 2025. The attack compromised the operational technology (OT) and industrial control systems (ICS) in 30 renewable energy and heating plants, impacting 500,000 people and also that nation’s manufacturing sector.

Why Cyber Security Budgets Fail (And How to Fix Them)

Organisations are investing heavily in cyber security, with global spending on cyber security products and services projected to reach approximately $213 billion in 2025 and expected to grow further to around $240 billion by 2026. Yet, a persistent paradox remains: despite escalating budgets, the threat landscape continues to evolve, and data breaches and cyber attacks are becoming more sophisticated and prevalent.

How Cato Turns Identity Noise Into High-Confidence Detections

Jeremy, the Head of IT, thought it was a normal Monday until his help desk was overwhelmed with login complaints. 37 employees couldn’t log in. Password resets were happening that nobody could explain, and some devices seemed to vanish from the identity directory. The worst part was that the identity logs did not show a clear break-in. There was no obvious malware and no dramatic spike, only routine-looking admin activity.

The Credential Stuffing Fix: Stop Bot Attacks Without Frustrating Real Users

Login abuse is one of the common types of cyberattacks. It happens quietly, often showing up as a spike in failed sign-ins or customers locked out of their accounts. On the surface, these events look routine. In reality, they are usually early signs of automated attacks targeting login systems. This pattern is commonly known as credential stuffing. In this method, attackers use automation to test large volumes of stolen usernames and passwords across multiple services.