Artificial Intelligence

Everyone’s adopting AI, few are managing the risk

Everyone’s adopting AI, few are managing the risk 2025-10-17 at 08:52 By Anamarija Pogorelec AI is spreading across enterprise risk functions, but confidence in those systems remains uneven, according to AuditBoard. More than half of organizations report implementing AI-specific tools, and many are training teams in machine learning skills. Yet, few feel prepared for the […]

React to this headline:

Loading spinner

Everyone’s adopting AI, few are managing the risk Read More »

When trusted AI connections turn hostile

When trusted AI connections turn hostile 2025-10-16 at 09:02 By Mirko Zorz Researchers have revealed a new security blind spot in how LLM applications connect to external systems. Their study shows that malicious Model Context Protocol (MCP) servers can quietly take control of hosts, manipulate LLM behavior, and deceive users, all while staying undetected by

React to this headline:

Loading spinner

When trusted AI connections turn hostile Read More »

Everyone wants AI, but few are ready to defend it

Everyone wants AI, but few are ready to defend it 2025-10-16 at 08:05 By Anamarija Pogorelec The rush to deploy AI is reshaping how companies think about risk, according to Cisco. A global study finds that while most organizations are moving quickly to adopt AI, many are not ready for the pressure it puts on

React to this headline:

Loading spinner

Everyone wants AI, but few are ready to defend it Read More »

The password problem we keep pretending to fix

The password problem we keep pretending to fix 2025-10-16 at 07:15 By Anamarija Pogorelec Experts across industries say they are still losing ground against identity-related breaches, even after years of investment in stronger access controls, according to RSA. Many said their organizations had faced at least one identity-related breach in recent years, and most of

React to this headline:

Loading spinner

The password problem we keep pretending to fix Read More »

Building trust in AI-powered security operations

Building trust in AI-powered security operations 2025-10-15 at 08:22 By Help Net Security In this Help Net Security video, James Hodge, VP, Global Specialist Organisation at Splunk, explores the transformative role of AI in cybersecurity threat detection. He explains how AI’s ability to process vast amounts of data and detect anomalies faster than humans is

React to this headline:

Loading spinner

Building trust in AI-powered security operations Read More »

Beyond the Black Box: Building Trust and Governance in the Age of AI

Beyond the Black Box: Building Trust and Governance in the Age of AI 2025-10-14 at 15:04 By Steve Durbin Balancing innovation with ethical governance is crucial for ensuring fairness, accountability, and public trust in the age of intelligent machines. The post Beyond the Black Box: Building Trust and Governance in the Age of AI appeared

React to this headline:

Loading spinner

Beyond the Black Box: Building Trust and Governance in the Age of AI Read More »

JPMorgan to Invest up to $10 Billion in US Companies with Crucial Ties to National Security

JPMorgan to Invest up to $10 Billion in US Companies with Crucial Ties to National Security 2025-10-13 at 21:24 By Associated Press The investment plan will focus on areas including artificial intelligence, cybersecurity and quantum computing. The post JPMorgan to Invest up to $10 Billion in US Companies with Crucial Ties to National Security appeared

React to this headline:

Loading spinner

JPMorgan to Invest up to $10 Billion in US Companies with Crucial Ties to National Security Read More »

Building a healthcare cybersecurity strategy that works

Building a healthcare cybersecurity strategy that works 2025-10-13 at 09:41 By Mirko Zorz In this Help Net Security interview, Wayman Cummings, CISO at Ochsner Health, talks about building a healthcare cybersecurity strategy, even when resources are tight. He explains how focusing on areas like vulnerability management and network segmentation can make the biggest difference. Cummings

React to this headline:

Loading spinner

Building a healthcare cybersecurity strategy that works Read More »

Attackers don’t linger, they strike and move on

Attackers don’t linger, they strike and move on 2025-10-13 at 07:26 By Anamarija Pogorelec Cyber attacks are happening faster than ever. Intrusions that once took weeks or months now unfold in minutes, leaving little time to react. Attackers move quickly once they gain access, aiming to run their payloads and get results before defenders can

React to this headline:

Loading spinner

Attackers don’t linger, they strike and move on Read More »

Your SOC is tired, AI isn’t

Your SOC is tired, AI isn’t 2025-10-10 at 07:39 By Anamarija Pogorelec Security teams have discussed AI in the SOC for years, but solid evidence of its impact has been limited. A recent benchmark study by Dropzone puts measurable evidence behind the idea, showing that AI agents can help analysts work faster and with greater

React to this headline:

Loading spinner

Your SOC is tired, AI isn’t Read More »

GitHub Copilot Chat Flaw Leaked Data From Private Repositories

GitHub Copilot Chat Flaw Leaked Data From Private Repositories 2025-10-09 at 14:04 By Ionut Arghire Hidden comments allowed full control over Copilot responses and leaked sensitive information and source code. The post GitHub Copilot Chat Flaw Leaked Data From Private Repositories appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

GitHub Copilot Chat Flaw Leaked Data From Private Repositories Read More »

Behind the screens: Building security customers appreciate

Behind the screens: Building security customers appreciate 2025-10-09 at 08:03 By Mirko Zorz In this Help Net Security interview, Jess Vachon, CISO at PRA Group, discusses the company’s multi-layered defense against fraud and its commitment to protecting customer trust. Vachon explains how PRA Group balances identity verification with a seamless customer experience. Vachon also reflects

React to this headline:

Loading spinner

Behind the screens: Building security customers appreciate Read More »

AI Takes Center Stage at DataTribe’s Cyber Innovation Day

AI Takes Center Stage at DataTribe’s Cyber Innovation Day 2025-10-08 at 20:02 By Kevin Townsend From defending AI agents to teaching robots to move safely, finalists at this year’s DataTribe Challenge are charting the next frontier in cybersecurity innovation. The post AI Takes Center Stage at DataTribe’s Cyber Innovation Day appeared first on SecurityWeek. This

React to this headline:

Loading spinner

AI Takes Center Stage at DataTribe’s Cyber Innovation Day Read More »

Will AI-SPM Become the Standard Security Layer for Safe AI Adoption?

Will AI-SPM Become the Standard Security Layer for Safe AI Adoption? 2025-10-08 at 19:31 By Etay Maor How security posture management for AI can protect against model poisoning, excessive agency, jailbreaking and other LLM risks. The post Will AI-SPM Become the Standard Security Layer for Safe AI Adoption? appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Will AI-SPM Become the Standard Security Layer for Safe AI Adoption? Read More »

Google DeepMind’s New AI Agent Finds and Fixes Vulnerabilities 

Google DeepMind’s New AI Agent Finds and Fixes Vulnerabilities  2025-10-08 at 16:35 By Eduard Kovacs The new product is called CodeMender and it can rewrite vulnerable code to prevent future exploits.  The post Google DeepMind’s New AI Agent Finds and Fixes Vulnerabilities  appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original

React to this headline:

Loading spinner

Google DeepMind’s New AI Agent Finds and Fixes Vulnerabilities  Read More »

Google Offers Up to $20,000 in New AI Bug Bounty Program

Google Offers Up to $20,000 in New AI Bug Bounty Program 2025-10-08 at 16:26 By Ionut Arghire The company has updated the program’s scope and has combined the rewards for abuse and security issues into a single table. The post Google Offers Up to $20,000 in New AI Bug Bounty Program appeared first on SecurityWeek.

React to this headline:

Loading spinner

Google Offers Up to $20,000 in New AI Bug Bounty Program Read More »

Rethinking AI security architectures beyond Earth

Rethinking AI security architectures beyond Earth 2025-10-08 at 09:39 By Mirko Zorz If you think managing cloud security is complex, try doing it across hundreds of satellites orbiting the planet. Each one is a moving endpoint that must stay secure while communicating through long, delay-prone links. A new study explores how AI could automate security

React to this headline:

Loading spinner

Rethinking AI security architectures beyond Earth Read More »

Cybersecurity’s next test: AI, quantum, and geopolitics

Cybersecurity’s next test: AI, quantum, and geopolitics 2025-10-07 at 14:03 By Anamarija Pogorelec Geopolitics, emerging technology, and skills shortages are reshaping cybersecurity priorities across industries, according to a new PwC report. The findings show a mix of rising awareness, persistent weaknesses, and uneven preparation for the next wave of threats. Geopolitical risk at the core

React to this headline:

Loading spinner

Cybersecurity’s next test: AI, quantum, and geopolitics Read More »

Manufacturing: Executives Voice Cyberattack Readiness Concerns

Manufacturing: Executives Voice Cyberattack Readiness Concerns 2025-10-06 at 17:12 By Manufacturing executives recently surveyed by LevelBlue expressed a deep concern that emerging attack methods, such as deepfakes and AI-powered attacks, will take place just as often as more traditional attacks. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Manufacturing: Executives Voice Cyberattack Readiness Concerns Read More »

Old authentication habits die hard

Old authentication habits die hard 2025-10-06 at 07:48 By Anamarija Pogorelec Many organizations still rely on weak authentication methods while workers’ personal habits create additional risks, according to Yubico. Training and policy gaps 40% of employees said they have never received cybersecurity training. Even among those who have, the guidance is often outdated because many

React to this headline:

Loading spinner

Old authentication habits die hard Read More »

Scroll to Top