Artificial Intelligence

Review: The Developer’s Playbook for Large Language Model Security

Review: The Developer’s Playbook for Large Language Model Security 2025-03-25 at 18:06 By Mirko Zorz With the adoption of large language models (LLMs) across industries, security teams often play catch-up. Many organizations are integrating GenAI into customer interactions, software development, and enterprise decision-making, often without grasping the security implications. As LLMs are becoming integral to […]

React to this headline:

Loading spinner

Review: The Developer’s Playbook for Large Language Model Security Read More »

Microsoft’s new AI agents take on phishing, patching, alert fatigue

Microsoft’s new AI agents take on phishing, patching, alert fatigue 2025-03-25 at 18:06 By Mirko Zorz Microsoft is rolling out a new generation of AI agents in Security Copilot, built to help with some of the most time-consuming security challenges, such as phishing, data protection, and identity management. Phishing is still one of the most

React to this headline:

Loading spinner

Microsoft’s new AI agents take on phishing, patching, alert fatigue Read More »

Microsoft Adds AI Agents to Security Copilot

Microsoft Adds AI Agents to Security Copilot 2025-03-25 at 16:20 By Ionut Arghire Microsoft has expanded the capabilities of Security Copilot with AI agents tackling data security, phishing, and identity management. The post Microsoft Adds AI Agents to Security Copilot appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React

React to this headline:

Loading spinner

Microsoft Adds AI Agents to Security Copilot Read More »

How AI agents could undermine computing infrastructure security

How AI agents could undermine computing infrastructure security 2025-03-25 at 07:34 By Help Net Security In this Help Net Security video, Ev Kontsevoy, CEO at Teleport, explores the risks AI agents pose to computing infrastructure, particularly when exposed to social engineering attacks. Unlike traditional software, AI agents aren’t fully deterministic, making them more vulnerable to

React to this headline:

Loading spinner

How AI agents could undermine computing infrastructure security Read More »

Why Principle of Least Privilege Matters More Than Ever in a World of Backdoored Large Language Models (LLMs)

Why Principle of Least Privilege Matters More Than Ever in a World of Backdoored Large Language Models (LLMs) 2025-03-24 at 15:03 By Tom Neaves The concept of “principle of least privilege” has been around for a long time. In fact, it is older than me; there are papers from the 70s that discuss it: This article is

React to this headline:

Loading spinner

Why Principle of Least Privilege Matters More Than Ever in a World of Backdoored Large Language Models (LLMs) Read More »

Enterprises walk a tightrope between AI innovation and security

Enterprises walk a tightrope between AI innovation and security 2025-03-24 at 08:02 By Help Net Security AI/ML tool usage surged globally in 2024, with enterprises integrating AI into operations and employees embedding it in daily workflows, according to Zscaler. The report reveals a 3,000+% year-over-year growth in enterprise use of AI/ML tools, highlighting the rapid

React to this headline:

Loading spinner

Enterprises walk a tightrope between AI innovation and security Read More »

New Jailbreak Technique Uses Fictional World to Manipulate AI

New Jailbreak Technique Uses Fictional World to Manipulate AI 2025-03-21 at 14:16 By Ionut Arghire Cato Networks discovers a new LLM jailbreak technique that relies on creating a fictional world to bypass a model’s security controls. The post New Jailbreak Technique Uses Fictional World to Manipulate AI appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

New Jailbreak Technique Uses Fictional World to Manipulate AI Read More »

How AI and automation are reshaping security leadership

How AI and automation are reshaping security leadership 2025-03-18 at 16:02 By Help Net Security The contemporary SOC is transforming as it starts to realize the benefits of GenAI and utilize the manifestations of autonomous agentic AI, according to Tines. Additionally, the promise of security automation is coming to fruition. In theory and practice, security

React to this headline:

Loading spinner

How AI and automation are reshaping security leadership Read More »

ChatGPT Vulnerability Exploited Against US Government Organizations

ChatGPT Vulnerability Exploited Against US Government Organizations 2025-03-18 at 12:02 By Ionut Arghire A year-old vulnerability in ChatGPT is being exploited against financial entities and US government organizations. The post ChatGPT Vulnerability Exploited Against US Government Organizations appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

ChatGPT Vulnerability Exploited Against US Government Organizations Read More »

Hackers target AI and crypto as software supply chain risks grow

Hackers target AI and crypto as software supply chain risks grow 2025-03-18 at 07:47 By Help Net Security The growing sophistication of software supply chain attacks is driven by widespread flaws in open-source and third-party commercial software, along with malicious campaigns that specifically target AI and cryptocurrency development pipelines, according to a ReversingLabs report. According

React to this headline:

Loading spinner

Hackers target AI and crypto as software supply chain risks grow Read More »

Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services

Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services 2025-03-17 at 13:16 By Eduard Kovacs Vulnerabilities in Nvidia Riva could allow hackers to abuse speech and translation AI services that are typically expensive.  The post Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services Read More »

New AI Security Tool Helps Organizations Set Trust Zones for Gen-AI Models

New AI Security Tool Helps Organizations Set Trust Zones for Gen-AI Models 2025-03-14 at 14:18 By Kevin Townsend Measure the different level of risk inherent to all gen-AI foundational models and use that to fine-tune the operation of in-house AI deployments. The post New AI Security Tool Helps Organizations Set Trust Zones for Gen-AI Models

React to this headline:

Loading spinner

New AI Security Tool Helps Organizations Set Trust Zones for Gen-AI Models Read More »

New CCA Jailbreak Method Works Against Most AI Models

New CCA Jailbreak Method Works Against Most AI Models 2025-03-14 at 13:36 By Ionut Arghire Two Microsoft researchers have devised a new jailbreak method that bypasses the safety mechanisms of most AI systems. The post New CCA Jailbreak Method Works Against Most AI Models appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

New CCA Jailbreak Method Works Against Most AI Models Read More »

Top 5 threats keeping CISOs up at night in 2025

Top 5 threats keeping CISOs up at night in 2025 2025-03-14 at 08:05 By Help Net Security Cyber threats in 2025 require a proactive, adaptive approach. To stay ahead, CISOs must balance technical defenses, regulatory expectations, and human factors. By prioritizing AI-driven security, ransomware resilience, supply chain risk management, insider threat mitigation, and compliance preparedness,

React to this headline:

Loading spinner

Top 5 threats keeping CISOs up at night in 2025 Read More »

DeepSeek’s Malware-Generation Capabilities Put to Test

DeepSeek’s Malware-Generation Capabilities Put to Test 2025-03-13 at 15:01 By Eduard Kovacs Researchers have analyzed the ability of the Chinese gen-AI DeepSeek to create malware such as ransomware and keyloggers. The post DeepSeek’s Malware-Generation Capabilities Put to Test appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this

React to this headline:

Loading spinner

DeepSeek’s Malware-Generation Capabilities Put to Test Read More »

Beware of DeepSeek Hype: It’s a Breeding Ground for Scammers

Beware of DeepSeek Hype: It’s a Breeding Ground for Scammers 2025-03-12 at 16:41 By Stu Sjouwerman Exploiting trust in the DeepSeek brand, scammers attempt to harvest personal information or steal user credentials. The post Beware of DeepSeek Hype: It’s a Breeding Ground for Scammers appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Beware of DeepSeek Hype: It’s a Breeding Ground for Scammers Read More »

Webinar Today: Protecting Executives and Enterprises from Digital, Narrative and Physical Attacks

Webinar Today: Protecting Executives and Enterprises from Digital, Narrative and Physical Attacks 2025-03-12 at 13:32 By SecurityWeek News How hyper agenda-driven threat actors, cybercriminals, and nation-states integrate digital, narrative, and physical attacks to target organizations through their executives. The post Webinar Today: Protecting Executives and Enterprises from Digital, Narrative and Physical Attacks appeared first on

React to this headline:

Loading spinner

Webinar Today: Protecting Executives and Enterprises from Digital, Narrative and Physical Attacks Read More »

How to spot and avoid AI-generated scams

How to spot and avoid AI-generated scams 2025-03-11 at 18:02 By Help Net Security As AI technology advances, cybercriminals create more personalized and convincing scams. This includes mimicking voices, deepfake videos, and highly convincing phishing emails that are difficult to spot. Phishing, deepfakes, and voice cloning are among the most common AI-driven techniques used by

React to this headline:

Loading spinner

How to spot and avoid AI-generated scams Read More »

Review: The Cybersecurity Trinity

Review: The Cybersecurity Trinity 2025-03-10 at 18:02 By Mirko Zorz The Cybersecurity Trinity provides a comprehensive approach to modern cybersecurity by integrating AI, automation, and active cyber defense (ACD) into a unified strategy. Instead of addressing these elements in isolation, the author demonstrates how they work together to enhance security effectiveness, offering a practical and

React to this headline:

Loading spinner

Review: The Cybersecurity Trinity Read More »

New AI Protection from Google Cloud Tackles AI Risks, Threats, and Compliance

New AI Protection from Google Cloud Tackles AI Risks, Threats, and Compliance 2025-03-07 at 13:31 By Kevin Townsend Google Cloud’s AI Protection helps discover AI inventory, secure AI assets, and manage threats with detect, investigate, and respond capabilities. The post New AI Protection from Google Cloud Tackles AI Risks, Threats, and Compliance appeared first on

React to this headline:

Loading spinner

New AI Protection from Google Cloud Tackles AI Risks, Threats, and Compliance Read More »

Scroll to Top