Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Intel Chat: Russian cyber ops, Sygnia, Ollama & TeamPCP [293]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Claude Code-powered multi-tenant SecOps for MSSPs | LimaCharlie demo

See how LimCharlie's Agentic SecOps Workspace handles multi-tenant security operations at scale. This demo walks through real-world scenarios that MSSPs face daily: Unlike token-based AI tools that become cost-prohibitive at scale, this platform uses a flat-fee per analyst model. Every capability in your tech stack becomes accessible through AI-powered automation, and you maintain full control with granular permissions.

The browser blind spot: Phishing evolution and shadow AI risk with Cody Pierce

Join us for this week's Defender Fridays as we explore browser security, phishing evolution, and the risks of shadow AI with Cody Pierce, CEO at Neon Cyber. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Find user activity across endpoints with Claude Code #cybersecurity #ai #securityoperations

Watch Claude Code query LimaCharlie telemetry to locate user activity across all endpoints in an organization. The agent correlates events across process execution, login sessions, and network connections to identify the most recent user activity and establish behavioral patterns. Security analysts can investigate user presence without manually searching through telemetry streams.

Intel Chat: OpenClaw saga, React Native Community, Notepad++ & GTIG targets IPIDEA network [291]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. JFrog article. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Claude Code converts threat reports into LimaCharlie detection rules #cybersecurity #ai

Feed Claude Code a threat report URL and it'll search for compromise indicators across LimaCharlie tenants, confirm the environment is clean, then it'll create and deploy detection rules. The agent extracts IOCs, generates rule logic, validates through testing, and establishes continuous monitoring. Security teams can operationalize published threat intelligence without manual rule writing.

Attackers exploited OpenClaw's popularity #cybersecurity #ai #podcast

In this week's Intel Chat, Chris Luft and Matt Bromiley discuss how a malicious VS Code extension impersonated OpenClaw (formerly ClawdBot) to distribute remote access malware to developers. Matt breaks down a critical pattern: whenever there's a stampede toward new technology, threat actors will find a way to inject a malicious version of it. The episode also covers PeckBirdie (a JScript-based C2 framework), Shiny Hunters' massive phishing campaign, and a Russian cyberattack on Poland's power grid.

Hunt an IP address across multiple tenants simultaneously with Claude Code #cybersecurity #ai

See Claude Code execute a parallel IOC hunt for a suspicious IP across multiple LimaCharlie organizations. The agent enumerates all available tenants, launches concurrent searches, normalizes results into match categories, and reports positive hits with sensor details, timestamps, and occurrence counts. Security teams can investigate threats across their entire fleet without manually querying each tenant.

Claude Code writes and tests Cobalt Strike detection rules #cybersecurity #ai #securityoperations

Watch Claude Code generate production-ready Cobalt Strike detection rules in LimaCharlie. The agent defines detection requirements, creates rule logic for high-signal patterns, validates syntax, and deploys rules to the tenant. Named-pipe indicators and process-based signatures are tested against positive and negative controls to confirm accuracy. Security teams can operationalize threat-specific detections in minutes instead of hours.