Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing the Human Layer: The Evolution of Cyber Attacks | Podcast

In this one-off exclusive podcast, Oliver Simonnet, CultureAI's Lead Cyber Security Researcher, sits down with William Jardine, Director at Reversec, and Richard Moore, CISO at 10x Banking, to explore the evolving realities of cyber resilience, AI adoption, and security leadership in a world where AI-driven workflows are becoming the norm.

How to Prevent Active Directory Attacks by Securing Privileged Accounts

Let’s be honest—when Active Directory is compromised, the incident is never small. Almost every major enterprise breach involves Active Directory at some point. Attackers may enter through phishing, malware, or a misconfigured endpoint, but their real goal is always the same: gain control over privileged identities and Domain Admin accounts. Once that happens, containment becomes difficult and recovery becomes painful. Preventing Active Directory attacks isn’t about adding more tools.

AI Agent-to-Agent Communication: The Next Major Attack Surface

We are witnessing the end of the "Human-in-the-Loop" era and the beginning of the "Agent-to-Agent" economy. Until recently, most AI interactions were hub-and-spoke models where a human user prompted a central model, reviewed the output, and then took action. That model provided a natural safety brake. If the AI hallucinated or suggested a malicious action, a human was there to catch it. That safety brake is disappearing.

Why Cybersecurity is the Core of Corporate Survival

Is your business ready for a digital ambush? It's a loaded question, sure. But not a hypothetical one. In today's landscape, it's practically rhetorical. One phishing scam, one rogue USB stick, one "I'll-just-connect-to-this-coffee-shop-Wi-Fi-for-a-minute" moment and everything can unravel. You'd think big companies would be immune with all their resources, right? Tell that to MGM Resorts, which hemorrhaged over $100 million in 2023 due to a single compromised login. A phone call. That's all it took.

Attackers exploited OpenClaw's popularity #cybersecurity #ai #podcast

In this week's Intel Chat, Chris Luft and Matt Bromiley discuss how a malicious VS Code extension impersonated OpenClaw (formerly ClawdBot) to distribute remote access malware to developers. Matt breaks down a critical pattern: whenever there's a stampede toward new technology, threat actors will find a way to inject a malicious version of it. The episode also covers PeckBirdie (a JScript-based C2 framework), Shiny Hunters' massive phishing campaign, and a Russian cyberattack on Poland's power grid.

2025 Q4 DDoS threat report: A record-setting 31.4 Tbps attack caps a year of massive DDoS assaults

Welcome to the 24th edition of Cloudflare’s Quarterly DDoS Threat Report. In this report, Cloudforce One offers a comprehensive analysis of the evolving threat landscape of Distributed Denial of Service (DDoS) attacks based on data from the Cloudflare network. In this edition, we focus on the fourth quarter of 2025, as well as share overall 2025 data.

Why This eScan Antivirus Supply Chain Attack Is a Security Nightmare

In mid-January 2026, one of the most ironic cybersecurity incidents in recent memory occurred: eScan antivirus software from MicroWorld Technologies began delivering malware to its own users. Attackers gained unauthorized access to a regional update server and quietly replaced a legitimate update component with a malicious version. For roughly two hours on January 20, 2026, systems that attempted to fetch updates received a trojanized Reload.exe instead of a security patch.

Report: One in Ten UK Companies Wouldn't Survive a Major Cyberattack

A new survey by Vodafone Business found that more than 10% of companies in the UK would likely go out of business if they were hit by a major cyber incident, such as a ransomware attack, Infosecurity Magazine reports. Additionally, 71% of business leaders believe at least one of their employees would fall for a convincing phishing attack, and fewer than half (45%) of organizations have ensured that all of their employees have received basic cyber awareness training.

Defending against deepfake cyberattacks: Why trust is the new security perimeter

Deepfake technology is now a legitimate enterprise level threat. What started as a potentially disturbing AI capability has rapidly become a powerful tool for cybercriminals and one that exploits the most fundamental element of business communication: trust. A new report from Info‑Tech Research Group, Defend Against Deepfake Cyberattacks, breaks down how to understand and assess the risk deepfakes pose to organizations of all sizes.

What A Real Nation State Cyber Attack Looks Like

A realistic nation state style attack is less cinematic blackout and more slow grind, with degraded services, conflicting information and outages that are hard to prioritise. Public confidence erodes as friction spreads and misinformation amplifies the chaos, and history shows societies fail when trust in key systems collapses faster than those systems adapt.