Artificial Intelligence

From Shadow IT to Shadow AI: The Evolution of Unseen Risk

From Shadow IT to Shadow AI: The Evolution of Unseen Risk 2025-09-16 at 16:04 By Jon Spokes Security leaders are well acquainted with Shadow IT; the unsanctioned apps, services, and even devices employees adopt to bypass bureaucracy and accelerate productivity. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

From Shadow IT to Shadow AI: The Evolution of Unseen Risk Read More »

ChatGPT’s New Calendar Integration Can Be Abused to Steal Emails

ChatGPT’s New Calendar Integration Can Be Abused to Steal Emails 2025-09-16 at 14:05 By Eduard Kovacs EdisonWatch researchers demonstrated the new hack after OpenAI added support for MCP tools in ChatGPT. The post ChatGPT’s New Calendar Integration Can Be Abused to Steal Emails appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

ChatGPT’s New Calendar Integration Can Be Abused to Steal Emails Read More »

Google introduces VaultGemma, a differentially private LLM built for secure data handling

Google introduces VaultGemma, a differentially private LLM built for secure data handling 2025-09-16 at 09:31 By Sinisa Markovic Google has released VaultGemma, a large language model designed to keep sensitive data private during training. The model uses differential privacy techniques to prevent individual data points from being exposed, which makes it safer for handling confidential

React to this headline:

Loading spinner

Google introduces VaultGemma, a differentially private LLM built for secure data handling Read More »

AI video surveillance could end privacy as we know it

AI video surveillance could end privacy as we know it 2025-09-16 at 08:40 By Sinisa Markovic AI-powered video surveillance brings up big questions about privacy. On one hand, it can make us feel safer, but on the other, it can easily cross the line into intrusion. The more we let technology watch and track our

React to this headline:

Loading spinner

AI video surveillance could end privacy as we know it Read More »

Most enterprise AI use is invisible to security teams

Most enterprise AI use is invisible to security teams 2025-09-15 at 10:38 By Mirko Zorz Most enterprise AI activity is happening without the knowledge of IT and security teams. According to Lanai, 89% of AI use inside organizations goes unseen, creating risks around data privacy, compliance, and governance. This blind spot is growing as AI

React to this headline:

Loading spinner

Most enterprise AI use is invisible to security teams Read More »

What could a secure 6G network look like?

What could a secure 6G network look like? 2025-09-15 at 08:47 By Help Net Security The official standards for 6G are set to be announced by the end of 2029. While the industry is moving towards consensus around how the 6G network will be built, it also needs to anticipate how it will be compromised

React to this headline:

Loading spinner

What could a secure 6G network look like? Read More »

CISOs brace for a new kind of AI chaos

CISOs brace for a new kind of AI chaos 2025-09-12 at 08:47 By Anamarija Pogorelec AI is being added to business processes faster than it is being secured, creating a wide gap that attackers are already exploiting, according to the SANS Institute. The scale of the problem Attackers are using AI to work at speeds

React to this headline:

Loading spinner

CISOs brace for a new kind of AI chaos Read More »

Webinar Today: Breaking AI – Inside the Art of LLM Pen Testing

Webinar Today: Breaking AI – Inside the Art of LLM Pen Testing 2025-09-11 at 18:14 By SecurityWeek News Join the webinar as we reveal a new model for AI pen testing – one grounded in social engineering, behavioral manipulation, and even therapeutic dialogue. The post Webinar Today: Breaking AI – Inside the Art of LLM

React to this headline:

Loading spinner

Webinar Today: Breaking AI – Inside the Art of LLM Pen Testing Read More »

UAE’s K2 Think AI Jailbroken Through Its Own Transparency Features

UAE’s K2 Think AI Jailbroken Through Its Own Transparency Features 2025-09-11 at 15:24 By Kevin Townsend Researchers exploited K2 Think’s built-in explainability to dismantle its safety guardrails, raising new questions about whether transparency and security in AI can truly coexist. The post UAE’s K2 Think AI Jailbroken Through Its Own Transparency Features appeared first on

React to this headline:

Loading spinner

UAE’s K2 Think AI Jailbroken Through Its Own Transparency Features Read More »

AI Emerges as the Hope—and Risk—for Overloaded SOCs

AI Emerges as the Hope—and Risk—for Overloaded SOCs 2025-09-11 at 14:30 By Kevin Townsend With security teams drowning in alerts, many suppress detection rules and accept hidden risks. AI promises relief through automation and triage—but without human oversight, it risks becoming part of the problem. The post AI Emerges as the Hope—and Risk—for Overloaded SOCs

React to this headline:

Loading spinner

AI Emerges as the Hope—and Risk—for Overloaded SOCs Read More »

AI is everywhere, but scaling it is another story

AI is everywhere, but scaling it is another story 2025-09-11 at 08:02 By Anamarija Pogorelec AI is being adopted across industries, but many organizations are hitting the same obstacles, according to Tines. IT leaders say orchestration is the key to scaling AI. They point to governance, visibility, and collaboration as the critical areas executives need

React to this headline:

Loading spinner

AI is everywhere, but scaling it is another story Read More »

Garak: Open-source LLM vulnerability scanner

Garak: Open-source LLM vulnerability scanner 2025-09-10 at 09:00 By Help Net Security LLMs can make mistakes, leak data, or be tricked into doing things they were not meant to do. Garak is a free, open-source tool designed to test these weaknesses. It checks for problems like hallucinations, prompt injections, jailbreaks, and toxic outputs. By running

React to this headline:

Loading spinner

Garak: Open-source LLM vulnerability scanner Read More »

AI agents are here, now comes the hard part for CISOs

AI agents are here, now comes the hard part for CISOs 2025-09-10 at 07:40 By Mirko Zorz AI agents are being deployed inside enterprises today to handle tasks across security operations. This shift creates new opportunities for security teams but also introduces new risks. Google Cloud’s new report, The ROI of AI 2025, shows that

React to this headline:

Loading spinner

AI agents are here, now comes the hard part for CISOs Read More »

Attackers test the limits of railway cybersecurity

Attackers test the limits of railway cybersecurity 2025-09-09 at 08:31 By Sinisa Markovic Railway systems are the lifeblood of many economies, supporting everything from daily passenger transport to military and industrial operations, so the question arises: how secure are they from a cybersecurity perspective? Like all industries, the railway industry is undergoing its digital transformation.

React to this headline:

Loading spinner

Attackers test the limits of railway cybersecurity Read More »

Employees keep feeding AI tools secrets they can’t take back

Employees keep feeding AI tools secrets they can’t take back 2025-09-09 at 08:03 By Anamarija Pogorelec Employees are putting sensitive data into public AI tools, and many organizations don’t have the controls to stop it. A new report from Kiteworks finds that most companies are missing basic safeguards to manage this data. Security control maturity

React to this headline:

Loading spinner

Employees keep feeding AI tools secrets they can’t take back Read More »

Are we headed for an AI culture war?

Are we headed for an AI culture war? 2025-09-09 at 07:52 By Help Net Security In this Help Net Security video, Matt Fangman, Field CTO at SailPoint, discusses whether an AI culture war is inevitable. He explores the rise of AI agents as a new identity type, the need for guardrails and human supervision, and

React to this headline:

Loading spinner

Are we headed for an AI culture war? Read More »

PromptLock Only PoC, but AI-Powered Ransomware Is Real

PromptLock Only PoC, but AI-Powered Ransomware Is Real 2025-09-08 at 17:37 By Ionut Arghire PromptLock is only a prototype of LLM-orchestrated ransomware, but hackers already use AI in file encryption and extortion attacks. The post PromptLock Only PoC, but AI-Powered Ransomware Is Real appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

PromptLock Only PoC, but AI-Powered Ransomware Is Real Read More »

Cyber defense cannot be democratized

Cyber defense cannot be democratized 2025-09-08 at 08:14 By Help Net Security The democratization of AI has fundamentally lowered the barrier for threat actors, creating a bigger pool of people who can carry out sophisticated attacks. The so-called democratization of security, on the other hand, has resulted in chaos. The problem In an earnest attempt

React to this headline:

Loading spinner

Cyber defense cannot be democratized Read More »

Identity management was hard, AI made it harder

Identity management was hard, AI made it harder 2025-09-08 at 07:33 By Anamarija Pogorelec Identity security is becoming a core part of cybersecurity operations, but many organizations are falling behind. A new report from SailPoint shows that as AI-driven identities and machine accounts grow, most security teams are not prepared to manage them at scale.

React to this headline:

Loading spinner

Identity management was hard, AI made it harder Read More »

AI moves fast, but data security must move faster

AI moves fast, but data security must move faster 2025-09-08 at 07:03 By Anamarija Pogorelec Generative AI is showing up everywhere in the enterprise, from customer service chatbots to marketing campaigns. It promises speed and innovation, but it also brings new and unfamiliar security risks. As companies rush to adopt these tools, many are discovering

React to this headline:

Loading spinner

AI moves fast, but data security must move faster Read More »

Scroll to Top