Artificial Intelligence

How CISOs are balancing risk, pressure and board expectations

How CISOs are balancing risk, pressure and board expectations 2025-08-28 at 07:05 By Sinisa Markovic AI has moved to the top of the CISO agenda. Three in five CISOs see generative AI as a security risk, with many worried about sensitive data leaking through public tools. At the same time, most organizations are not blocking […]

React to this headline:

Loading spinner

How CISOs are balancing risk, pressure and board expectations Read More »

Malicious Screen Connect Campaign Abuses AI-Themed Lures for Xworm Delivery

Malicious Screen Connect Campaign Abuses AI-Themed Lures for Xworm Delivery 2025-08-27 at 21:47 By Bolesław Szołtysik, Chris Tomboc, Serhii Melnyk During a recent Advanced Continual Threat Hunt (ACTH) investigation, the Trustwave SpiderLabs Threat Hunt team identified a deceptive campaign that abused fake AI-themed content to lure users into executing a malicious, pre-configured ScreenConnect installer. This

React to this headline:

Loading spinner

Malicious Screen Connect Campaign Abuses AI-Themed Lures for Xworm Delivery Read More »

Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect

Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect 2025-08-27 at 20:01 By Kevin Townsend AI-powered phishing attacks leverage ConnectWise ScreenConnect for remote access, underscoring their sophistication. The post Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this

React to this headline:

Loading spinner

Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect Read More »

AI is becoming a core tool in cybercrime, Anthropic warns

AI is becoming a core tool in cybercrime, Anthropic warns 2025-08-27 at 17:32 By Anamarija Pogorelec A new report from Anthropic shows how criminals are using AI to actively run parts of their operations. The findings suggest that AI is now embedded across the full attack cycle, from reconnaissance and malware development to fraud and

React to this headline:

Loading spinner

AI is becoming a core tool in cybercrime, Anthropic warns Read More »

PromptLock: First AI-Powered Ransomware Emerges

PromptLock: First AI-Powered Ransomware Emerges 2025-08-27 at 14:51 By Ionut Arghire Proof-of-concept ransomware uses AI models to generate attack scripts in real time. The post PromptLock: First AI-Powered Ransomware Emerges appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

PromptLock: First AI-Powered Ransomware Emerges Read More »

AI Security Map: Linking AI vulnerabilities to real-world impact

AI Security Map: Linking AI vulnerabilities to real-world impact 2025-08-27 at 09:40 By Mirko Zorz A single prompt injection in a customer-facing chatbot can leak sensitive data, damage trust, and draw regulatory scrutiny in hours. The technical breach is only the first step. The real risk comes from how quickly one weakness in an AI

React to this headline:

Loading spinner

AI Security Map: Linking AI vulnerabilities to real-world impact Read More »

How compliance teams can turn AI risk into opportunity

How compliance teams can turn AI risk into opportunity 2025-08-27 at 08:52 By Mirko Zorz AI is moving faster than regulation, and that creates opportunities and risks for compliance teams. While governments work on new rules, businesses cannot sit back and wait. In this Help Net Security video, Matt Hillary, CISO at Drata, look at

React to this headline:

Loading spinner

How compliance teams can turn AI risk into opportunity Read More »

What CISOs can learn from Doppel’s new AI-driven social engineering simulation

What CISOs can learn from Doppel’s new AI-driven social engineering simulation 2025-08-27 at 07:51 By Sinisa Markovic Doppel has introduced a new product called Doppel Simulation, which expands its platform for defending against social engineering. The tool uses autonomous AI agents to create multi-channel simulations that mirror how attackers operate across email, SMS, messaging apps,

React to this headline:

Loading spinner

What CISOs can learn from Doppel’s new AI-driven social engineering simulation Read More »

Beyond the Prompt: Building Trustworthy Agent Systems

Beyond the Prompt: Building Trustworthy Agent Systems 2025-08-26 at 18:03 By Stu Sjouwerman Building secure AI agent systems requires a disciplined engineering approach focused on deliberate architecture and human oversight. The post Beyond the Prompt: Building Trustworthy Agent Systems appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

Beyond the Prompt: Building Trustworthy Agent Systems Read More »

AI Systems Vulnerable to Prompt Injection via Image Scaling Attack

AI Systems Vulnerable to Prompt Injection via Image Scaling Attack 2025-08-26 at 13:47 By Eduard Kovacs Researchers show how popular AI systems can be tricked into processing malicious instructions by hiding them in images. The post AI Systems Vulnerable to Prompt Injection via Image Scaling Attack appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

AI Systems Vulnerable to Prompt Injection via Image Scaling Attack Read More »

LLMs at the edge: Rethinking how IoT devices talk and act

LLMs at the edge: Rethinking how IoT devices talk and act 2025-08-26 at 08:01 By Mirko Zorz Anyone who has set up a smart home knows the routine: one app to dim the lights, another to adjust the thermostat, and a voice assistant that only understands exact phrasing. These systems call themselves smart, but in

React to this headline:

Loading spinner

LLMs at the edge: Rethinking how IoT devices talk and act Read More »

How to build a secure AI culture without shutting people down

How to build a secure AI culture without shutting people down 2025-08-26 at 07:32 By Help Net Security In this Help Net Security video, Michael Burch, Director of Application Security at Security Journey, explains how organizations can build a secure AI culture. He highlights the risks of banning AI outright, the dangers of shadow AI,

React to this headline:

Loading spinner

How to build a secure AI culture without shutting people down Read More »

OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail

OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail 2025-08-25 at 20:17 By Kevin Townsend Researchers unveil OneFlip, a Rowhammer-based attack that flips a single bit in neural network weights to stealthily backdoor AI systems without degrading performance. The post OneFlip: An Emerging Threat to AI that Could Make

React to this headline:

Loading spinner

OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail Read More »

Why a new AI tool could change how we test insider threat defenses

Why a new AI tool could change how we test insider threat defenses 2025-08-25 at 09:04 By Mirko Zorz Insider threats are among the hardest attacks to detect because they come from people who already have legitimate access. Security teams know the risk well, but they often lack the data needed to train systems that

React to this headline:

Loading spinner

Why a new AI tool could change how we test insider threat defenses Read More »

Review: Adversarial AI Attacks, Mitigations, and Defense Strategies

Review: Adversarial AI Attacks, Mitigations, and Defense Strategies 2025-08-25 at 07:50 By Mirko Zorz Adversarial AI Attacks, Mitigations, and Defense Strategies shows how AI systems can be attacked and how defenders can prepare. It’s essentially a walkthrough of offensive and defensive approaches to AI security. About the author John Sotiropoulos is the Head Of AI

React to this headline:

Loading spinner

Review: Adversarial AI Attacks, Mitigations, and Defense Strategies Read More »

Smart manufacturing demands workers with AI and cybersecurity skills

Smart manufacturing demands workers with AI and cybersecurity skills 2025-08-25 at 07:13 By Sinisa Markovic The manufacturing sector is entering a new phase of digital transformation. According to Rockwell Automation’s 10th Annual State of Smart Manufacturing Report, 56% of manufacturers are piloting smart manufacturing initiatives, 20% have deployed them at scale, and another 20% are

React to this headline:

Loading spinner

Smart manufacturing demands workers with AI and cybersecurity skills Read More »

AI gives ransomware gangs a deadly upgrade

AI gives ransomware gangs a deadly upgrade 2025-08-22 at 09:00 By Sinisa Markovic Ransomware continues to be the major threat to large and medium-sized businesses, with numerous ransomware gangs abusing AI for automation, according to Acronis. Ransomware gangs maintain pressure on victims From January to June 2025, the number of publicly reported ransomware victims jumped

React to this headline:

Loading spinner

AI gives ransomware gangs a deadly upgrade Read More »

The new battleground for CISOs is human behavior

The new battleground for CISOs is human behavior 2025-08-22 at 08:40 By Anamarija Pogorelec Attackers don’t always need a technical flaw. More often, they just trick your people. Social engineering works, and AI makes it harder to catch.” Only about one in four cybersecurity teams are effective at collaborating with the broader business (Source: LevelBlue)

React to this headline:

Loading spinner

The new battleground for CISOs is human behavior Read More »

Introducing D-Fence: MailMarshal’s Advanced Machine Learning Phishing Protection

Introducing D-Fence: MailMarshal’s Advanced Machine Learning Phishing Protection 2025-08-21 at 16:05 By MailMarshal’s new D-Fence layer uses machine learning to combat sophisticated phishing attacks by analyzing email structure and identifying hidden malicious elements. D-Fence provides next-generation email security by catching 40% more phishing emails that previously went undetected. D-Fence works with URLDeep to deliver powerful

React to this headline:

Loading spinner

Introducing D-Fence: MailMarshal’s Advanced Machine Learning Phishing Protection Read More »

Using lightweight LLMs to cut incident response times and reduce hallucinations

Using lightweight LLMs to cut incident response times and reduce hallucinations 2025-08-21 at 09:03 By Mirko Zorz Researchers from the University of Melbourne and Imperial College London have developed a method for using LLMs to improve incident response planning with a focus on reducing the risk of hallucinations. Their approach uses a smaller, fine-tuned LLM

React to this headline:

Loading spinner

Using lightweight LLMs to cut incident response times and reduce hallucinations Read More »

Scroll to Top