AI

PromptLock Only PoC, but AI-Powered Ransomware Is Real

PromptLock Only PoC, but AI-Powered Ransomware Is Real 2025-09-08 at 17:37 By Ionut Arghire PromptLock is only a prototype of LLM-orchestrated ransomware, but hackers already use AI in file encryption and extortion attacks. The post PromptLock Only PoC, but AI-Powered Ransomware Is Real appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View […]

React to this headline:

Loading spinner

PromptLock Only PoC, but AI-Powered Ransomware Is Real Read More »

How to Close the AI Governance Gap in Software Development

How to Close the AI Governance Gap in Software Development 2025-09-05 at 18:14 By Matias Madou Widespread adoption of AI coding tools accelerates development—but also introduces critical vulnerabilities that demand stronger governance and oversight. The post How to Close the AI Governance Gap in Software Development appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

How to Close the AI Governance Gap in Software Development Read More »

Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool

Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool 2025-09-05 at 16:44 By Ionut Arghire Called A2, the framework mimics human analysis to identify vulnerabilities in Android applications and then validates them. The post Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool Read More »

Stealthy attack serves poisoned web pages only to AI agents

Stealthy attack serves poisoned web pages only to AI agents 2025-09-05 at 14:30 By Zeljka Zorz AI agents can be tricked into covertly performing malicious actions by websites that are hidden from regular users’ view, JFrog AI architect Shaked Zychlinski has found. This novel approach allows attackers to inject prompts / instructions into these autonomous

React to this headline:

Loading spinner

Stealthy attack serves poisoned web pages only to AI agents Read More »

AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products

AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products 2025-09-04 at 16:00 By Eduard Kovacs An AI supply chain issue named Model Namespace Reuse can allow attackers to deploy malicious models and achieve code execution. The post AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products Read More »

Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect

Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect 2025-08-27 at 20:01 By Kevin Townsend AI-powered phishing attacks leverage ConnectWise ScreenConnect for remote access, underscoring their sophistication. The post Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this

React to this headline:

Loading spinner

Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect Read More »

PromptLock: First AI-Powered Ransomware Emerges

PromptLock: First AI-Powered Ransomware Emerges 2025-08-27 at 14:51 By Ionut Arghire Proof-of-concept ransomware uses AI models to generate attack scripts in real time. The post PromptLock: First AI-Powered Ransomware Emerges appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

PromptLock: First AI-Powered Ransomware Emerges Read More »

Beyond the Prompt: Building Trustworthy Agent Systems

Beyond the Prompt: Building Trustworthy Agent Systems 2025-08-26 at 18:03 By Stu Sjouwerman Building secure AI agent systems requires a disciplined engineering approach focused on deliberate architecture and human oversight. The post Beyond the Prompt: Building Trustworthy Agent Systems appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

Beyond the Prompt: Building Trustworthy Agent Systems Read More »

AI Systems Vulnerable to Prompt Injection via Image Scaling Attack

AI Systems Vulnerable to Prompt Injection via Image Scaling Attack 2025-08-26 at 13:47 By Eduard Kovacs Researchers show how popular AI systems can be tricked into processing malicious instructions by hiding them in images. The post AI Systems Vulnerable to Prompt Injection via Image Scaling Attack appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

AI Systems Vulnerable to Prompt Injection via Image Scaling Attack Read More »

Managing the Trust-Risk Equation in AI: Predicting Hallucinations Before They Strike

Managing the Trust-Risk Equation in AI: Predicting Hallucinations Before They Strike 2025-08-11 at 17:17 By Kevin Townsend New physics-based research suggests large language models could predict when their own answers are about to go wrong — a potential game changer for trust, risk, and security in AI-driven systems. The post Managing the Trust-Risk Equation in

React to this headline:

Loading spinner

Managing the Trust-Risk Equation in AI: Predicting Hallucinations Before They Strike Read More »

Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise

Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise 2025-08-08 at 21:34 By Kevin Townsend Researchers demonstrate how multi-turn “storytelling” attacks bypass prompt-level filters, exposing systemic weaknesses in GPT-5’s defenses. The post Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise Read More »

Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation

Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation 2025-08-07 at 02:36 By Eduard Kovacs Zenity has shown how AI assistants such as ChatGPT, Copilot, Cursor, Gemini, and Salesforce Einstein can be abused using specially crafted prompts. The post Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation appeared first on

React to this headline:

Loading spinner

Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation Read More »

Project Ire: Microsoft’s autonomous malware detection AI agent

Project Ire: Microsoft’s autonomous malware detection AI agent 2025-08-05 at 19:45 By Zeljka Zorz Microsoft is working on a AI agent whose main goal is autonomous malware detection and the prototype – dubbed Project Ire – is showing great potential, the company has announced on Tuesday. Tested on a dataset of known malicious and benign

React to this headline:

Loading spinner

Project Ire: Microsoft’s autonomous malware detection AI agent Read More »

Vibe Coding: When Everyone’s a Developer, Who Secures the Code?

Vibe Coding: When Everyone’s a Developer, Who Secures the Code? 2025-08-05 at 16:42 By Kevin Townsend As AI makes software development accessible to all, security teams face a new challenge: protecting applications built by non-developers at unprecedented speed and scale. The post Vibe Coding: When Everyone’s a Developer, Who Secures the Code? appeared first on

React to this headline:

Loading spinner

Vibe Coding: When Everyone’s a Developer, Who Secures the Code? Read More »

Microsoft Offers $5 Million at Zero Day Quest Hacking Contest

Microsoft Offers $5 Million at Zero Day Quest Hacking Contest 2025-08-05 at 11:38 By Ionut Arghire Research demonstrating high-impact cloud and AI security flaws will be rewarded at Microsoft’s Zero Day Quest competition in spring 2026. The post Microsoft Offers $5 Million at Zero Day Quest Hacking Contest appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Microsoft Offers $5 Million at Zero Day Quest Hacking Contest Read More »

Nvidia Triton Vulnerabilities Pose Big Risk to AI Models

Nvidia Triton Vulnerabilities Pose Big Risk to AI Models 2025-08-04 at 21:22 By Eduard Kovacs Nvidia has patched over a dozen vulnerabilities in Triton Inference Server, including another set of vulnerabilities that threaten AI systems.  The post Nvidia Triton Vulnerabilities Pose Big Risk to AI Models appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Nvidia Triton Vulnerabilities Pose Big Risk to AI Models Read More »

AI Guardrails Under Fire: Cisco’s Jailbreak Demo Exposes AI Weak Points

AI Guardrails Under Fire: Cisco’s Jailbreak Demo Exposes AI Weak Points 2025-08-04 at 16:04 By Kevin Townsend Cisco’s latest jailbreak method reveals just how easily sensitive data can be extracted from chatbots trained on proprietary or copyrighted content. The post AI Guardrails Under Fire: Cisco’s Jailbreak Demo Exposes AI Weak Points appeared first on SecurityWeek.

React to this headline:

Loading spinner

AI Guardrails Under Fire: Cisco’s Jailbreak Demo Exposes AI Weak Points Read More »

Noma Security Raises $100 Million for AI Security Platform

Noma Security Raises $100 Million for AI Security Platform 2025-07-31 at 18:34 By Eduard Kovacs Noma Security has announced a Series B funding round that will enable the company’s growth and expansion of its AI agent security solutions.  The post Noma Security Raises $100 Million for AI Security Platform appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Noma Security Raises $100 Million for AI Security Platform Read More »

Browser Extensions Pose Serious Threat to Gen-AI Tools Handling Sensitive Data 

Browser Extensions Pose Serious Threat to Gen-AI Tools Handling Sensitive Data  2025-07-31 at 15:07 By Eduard Kovacs LayerX has disclosed an AI chatbot hacking method via web browser extensions it has named ‘man-in-the-prompt’. The post Browser Extensions Pose Serious Threat to Gen-AI Tools Handling Sensitive Data  appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Browser Extensions Pose Serious Threat to Gen-AI Tools Handling Sensitive Data  Read More »

Cyata Emerges From Stealth With $8.5 Million in Funding

Cyata Emerges From Stealth With $8.5 Million in Funding 2025-07-30 at 15:16 By Ionut Arghire The Israeli startup helps organizations identify, monitor, and control AI agents across their environments. The post Cyata Emerges From Stealth With $8.5 Million in Funding appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React

React to this headline:

Loading spinner

Cyata Emerges From Stealth With $8.5 Million in Funding Read More »

Scroll to Top