Artificial Intelligence

AI moves fast, but data security must move faster

AI moves fast, but data security must move faster 2025-09-08 at 07:03 By Anamarija Pogorelec Generative AI is showing up everywhere in the enterprise, from customer service chatbots to marketing campaigns. It promises speed and innovation, but it also brings new and unfamiliar security risks. As companies rush to adopt these tools, many are discovering […]

React to this headline:

Loading spinner

AI moves fast, but data security must move faster Read More »

Rogue AI Agents In Your SOCs and SIEMs – Indirect Prompt Injection via Log Files

Rogue AI Agents In Your SOCs and SIEMs – Indirect Prompt Injection via Log Files 2025-09-05 at 23:42 By Tom Neaves AI agents (utilizing LLMs and RAG) are being used within SOCs and SIEMS to both help identify attacks and assist analysts with working more efficiently; however, I’ve done a little bit of research one

React to this headline:

Loading spinner

Rogue AI Agents In Your SOCs and SIEMs – Indirect Prompt Injection via Log Files Read More »

How to Close the AI Governance Gap in Software Development

How to Close the AI Governance Gap in Software Development 2025-09-05 at 18:14 By Matias Madou Widespread adoption of AI coding tools accelerates development—but also introduces critical vulnerabilities that demand stronger governance and oversight. The post How to Close the AI Governance Gap in Software Development appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

How to Close the AI Governance Gap in Software Development Read More »

Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool

Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool 2025-09-05 at 16:44 By Ionut Arghire Called A2, the framework mimics human analysis to identify vulnerabilities in Android applications and then validates them. The post Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool Read More »

AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products

AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products 2025-09-04 at 16:00 By Eduard Kovacs An AI supply chain issue named Model Namespace Reuse can allow attackers to deploy malicious models and achieve code execution. The post AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products Read More »

Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams

Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams 2025-09-04 at 15:03 By SecurityWeek News The Israeli startup’s AI-powered no-code platform helps security teams design and deploy custom apps in minutes—tackling tool sprawl without heavy engineering. The post Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams appeared first

React to this headline:

Loading spinner

Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams Read More »

Sola Security Rases $35M to Bring No-Code App Building to Cybersecurity Teams

Sola Security Rases $35M to Bring No-Code App Building to Cybersecurity Teams 2025-09-04 at 14:48 By SecurityWeek News The Israeli startup’s AI-powered no-code platform helps security teams design and deploy custom apps in minutes—tackling tool sprawl without heavy engineering. The post Sola Security Rases $35M to Bring No-Code App Building to Cybersecurity Teams appeared first

React to this headline:

Loading spinner

Sola Security Rases $35M to Bring No-Code App Building to Cybersecurity Teams Read More »

Cato Networks Acquires AI Security Firm Aim Security

Cato Networks Acquires AI Security Firm Aim Security 2025-09-03 at 16:45 By Mike Lennon Founded in 2022 to help organizations with the secure deployment of generative-AI utilities, Aim emerged from stealth in January 2024. The post Cato Networks Acquires AI Security Firm Aim Security appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Cato Networks Acquires AI Security Firm Aim Security Read More »

Trustwave Security Colony’s 8 Commandments for AI Adoption

Trustwave Security Colony’s 8 Commandments for AI Adoption 2025-09-03 at 16:14 By Trustwave Security Colony’s 8 Commandments for Artificial Intelligence adoption help organizations reduce risks while improving business outcomes. Align your cybersecurity strategy with responsible AI policies to ensure safe, ethical, and compliant use of technology. Strengthen resilience by integrating artificial intelligence adoption guidelines with

React to this headline:

Loading spinner

Trustwave Security Colony’s 8 Commandments for AI Adoption Read More »

BruteForceAI: Free AI-powered login brute force tool

BruteForceAI: Free AI-powered login brute force tool 2025-09-03 at 09:31 By Help Net Security BruteForceAI is a penetration testing tool that uses LLMs to improve the way brute-force attacks are carried out. Instead of relying on manual setup, the tool can analyze HTML content, detect login form selectors, and prepare the attack process automatically. It

React to this headline:

Loading spinner

BruteForceAI: Free AI-powered login brute force tool Read More »

AI will drive purchases this year, but not without questions

AI will drive purchases this year, but not without questions 2025-09-03 at 07:04 By Sinisa Markovic AI is moving into security operations, but CISOs are approaching it with a mix of optimism and realism. A new report from Arctic Wolf shows that most organizations are exploring or adopting AI-driven tools, yet many still see risks

React to this headline:

Loading spinner

AI will drive purchases this year, but not without questions Read More »

Can AI agents catch what your SOC misses?

Can AI agents catch what your SOC misses? 2025-09-02 at 10:45 By Mirko Zorz A new research project called NetMoniAI shows how AI agents might reshape network monitoring and security. Developed by a team at Texas Tech University, the framework brings together two ideas: distributed monitoring at the edge and AI-driven analysis at the center.

React to this headline:

Loading spinner

Can AI agents catch what your SOC misses? Read More »

AIDEFEND: Free AI defense framework

AIDEFEND: Free AI defense framework 2025-09-01 at 09:21 By Mirko Zorz AIDEFEND (Artificial Intelligence Defense Framework) is an open knowledge base dedicated to AI security, providing defensive countermeasures and best practices to help security pros safeguard AI and machine learning systems. Practicality is at the core of AIDEFEND. The framework is designed to be “highly

React to this headline:

Loading spinner

AIDEFEND: Free AI defense framework Read More »

GenAI is fueling smarter fraud, but broken teamwork is the real problem

GenAI is fueling smarter fraud, but broken teamwork is the real problem 2025-09-01 at 08:03 By Anamarija Pogorelec More than 80 percent of large U.S. companies were targeted by socially engineered fraud in the past year, according to Trustmi’s 2025 Socially Engineered Fraud & Risk Report. Nearly half of those organizations reported a direct financial

React to this headline:

Loading spinner

GenAI is fueling smarter fraud, but broken teamwork is the real problem Read More »

AI isn’t taking over the world, but here’s what you should worry about

AI isn’t taking over the world, but here’s what you should worry about 2025-08-29 at 10:03 By Help Net Security In this Help Net Security video, Josh Meier, Senior Generative AI Author at Pluralsight, debunks the myth that AI could “escape” servers or act on its own. He explains how large language models actually work,

React to this headline:

Loading spinner

AI isn’t taking over the world, but here’s what you should worry about Read More »

AI can’t deliver without trusted, well-governed information

AI can’t deliver without trusted, well-governed information 2025-08-29 at 10:03 By Sinisa Markovic While enterprise IT leaders recognize the transformative potential of AI, a gap in information readiness is causing their organizations to struggle in securing, governing, and aligning AI initiatives across business, according to a survey conducted by the Ponemon Institute. Who is the

React to this headline:

Loading spinner

AI can’t deliver without trusted, well-governed information Read More »

Agentic AI coding assistant helped attacker breach, extort 17 distinct organizations

Agentic AI coding assistant helped attacker breach, extort 17 distinct organizations 2025-08-28 at 15:29 By Zeljka Zorz Cybercriminals have started “vibe hacking” with AI’s help, AI startup Anthropic has shared in a report released on Wednesday. An attacker used the agentic AI coding assistant Claude Code for nearly all steps of a data extortion operation

React to this headline:

Loading spinner

Agentic AI coding assistant helped attacker breach, extort 17 distinct organizations Read More »

ScamAgent shows how AI could power the next wave of scam calls

ScamAgent shows how AI could power the next wave of scam calls 2025-08-28 at 09:03 By Mirko Zorz Scam calls have long been a problem for consumers and enterprises, but a new study suggests they may soon get an upgrade. Instead of a human scammer on the other end of the line, future calls could

React to this headline:

Loading spinner

ScamAgent shows how AI could power the next wave of scam calls Read More »

Where security, DevOps, and data science finally meet on AI strategy

Where security, DevOps, and data science finally meet on AI strategy 2025-08-28 at 08:34 By Mirko Zorz AI infrastructure is expensive, complex, and often caught between competing priorities. On one side, security teams want strong isolation and boundaries. On the other, engineers push for performance, density, and cost savings. With GPUs in short supply and

React to this headline:

Loading spinner

Where security, DevOps, and data science finally meet on AI strategy Read More »

How CISOs are balancing risk, pressure and board expectations

How CISOs are balancing risk, pressure and board expectations 2025-08-28 at 07:05 By Sinisa Markovic AI has moved to the top of the CISO agenda. Three in five CISOs see generative AI as a security risk, with many worried about sensitive data leaking through public tools. At the same time, most organizations are not blocking

React to this headline:

Loading spinner

How CISOs are balancing risk, pressure and board expectations Read More »

Scroll to Top