Artificial Intelligence

Garak: Open-source LLM vulnerability scanner

Garak: Open-source LLM vulnerability scanner 2025-09-10 at 09:00 By Help Net Security LLMs can make mistakes, leak data, or be tricked into doing things they were not meant to do. Garak is a free, open-source tool designed to test these weaknesses. It checks for problems like hallucinations, prompt injections, jailbreaks, and toxic outputs. By running […]

React to this headline:

Loading spinner

Garak: Open-source LLM vulnerability scanner Read More »

AI agents are here, now comes the hard part for CISOs

AI agents are here, now comes the hard part for CISOs 2025-09-10 at 07:40 By Mirko Zorz AI agents are being deployed inside enterprises today to handle tasks across security operations. This shift creates new opportunities for security teams but also introduces new risks. Google Cloud’s new report, The ROI of AI 2025, shows that

React to this headline:

Loading spinner

AI agents are here, now comes the hard part for CISOs Read More »

Attackers test the limits of railway cybersecurity

Attackers test the limits of railway cybersecurity 2025-09-09 at 08:31 By Sinisa Markovic Railway systems are the lifeblood of many economies, supporting everything from daily passenger transport to military and industrial operations, so the question arises: how secure are they from a cybersecurity perspective? Like all industries, the railway industry is undergoing its digital transformation.

React to this headline:

Loading spinner

Attackers test the limits of railway cybersecurity Read More »

Employees keep feeding AI tools secrets they can’t take back

Employees keep feeding AI tools secrets they can’t take back 2025-09-09 at 08:03 By Anamarija Pogorelec Employees are putting sensitive data into public AI tools, and many organizations don’t have the controls to stop it. A new report from Kiteworks finds that most companies are missing basic safeguards to manage this data. Security control maturity

React to this headline:

Loading spinner

Employees keep feeding AI tools secrets they can’t take back Read More »

Are we headed for an AI culture war?

Are we headed for an AI culture war? 2025-09-09 at 07:52 By Help Net Security In this Help Net Security video, Matt Fangman, Field CTO at SailPoint, discusses whether an AI culture war is inevitable. He explores the rise of AI agents as a new identity type, the need for guardrails and human supervision, and

React to this headline:

Loading spinner

Are we headed for an AI culture war? Read More »

PromptLock Only PoC, but AI-Powered Ransomware Is Real

PromptLock Only PoC, but AI-Powered Ransomware Is Real 2025-09-08 at 17:37 By Ionut Arghire PromptLock is only a prototype of LLM-orchestrated ransomware, but hackers already use AI in file encryption and extortion attacks. The post PromptLock Only PoC, but AI-Powered Ransomware Is Real appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

PromptLock Only PoC, but AI-Powered Ransomware Is Real Read More »

Cyber defense cannot be democratized

Cyber defense cannot be democratized 2025-09-08 at 08:14 By Help Net Security The democratization of AI has fundamentally lowered the barrier for threat actors, creating a bigger pool of people who can carry out sophisticated attacks. The so-called democratization of security, on the other hand, has resulted in chaos. The problem In an earnest attempt

React to this headline:

Loading spinner

Cyber defense cannot be democratized Read More »

Identity management was hard, AI made it harder

Identity management was hard, AI made it harder 2025-09-08 at 07:33 By Anamarija Pogorelec Identity security is becoming a core part of cybersecurity operations, but many organizations are falling behind. A new report from SailPoint shows that as AI-driven identities and machine accounts grow, most security teams are not prepared to manage them at scale.

React to this headline:

Loading spinner

Identity management was hard, AI made it harder Read More »

AI moves fast, but data security must move faster

AI moves fast, but data security must move faster 2025-09-08 at 07:03 By Anamarija Pogorelec Generative AI is showing up everywhere in the enterprise, from customer service chatbots to marketing campaigns. It promises speed and innovation, but it also brings new and unfamiliar security risks. As companies rush to adopt these tools, many are discovering

React to this headline:

Loading spinner

AI moves fast, but data security must move faster Read More »

Rogue AI Agents In Your SOCs and SIEMs – Indirect Prompt Injection via Log Files

Rogue AI Agents In Your SOCs and SIEMs – Indirect Prompt Injection via Log Files 2025-09-05 at 23:42 By Tom Neaves AI agents (utilizing LLMs and RAG) are being used within SOCs and SIEMS to both help identify attacks and assist analysts with working more efficiently; however, I’ve done a little bit of research one

React to this headline:

Loading spinner

Rogue AI Agents In Your SOCs and SIEMs – Indirect Prompt Injection via Log Files Read More »

How to Close the AI Governance Gap in Software Development

How to Close the AI Governance Gap in Software Development 2025-09-05 at 18:14 By Matias Madou Widespread adoption of AI coding tools accelerates development—but also introduces critical vulnerabilities that demand stronger governance and oversight. The post How to Close the AI Governance Gap in Software Development appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

How to Close the AI Governance Gap in Software Development Read More »

Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool

Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool 2025-09-05 at 16:44 By Ionut Arghire Called A2, the framework mimics human analysis to identify vulnerabilities in Android applications and then validates them. The post Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool Read More »

AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products

AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products 2025-09-04 at 16:00 By Eduard Kovacs An AI supply chain issue named Model Namespace Reuse can allow attackers to deploy malicious models and achieve code execution. The post AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products Read More »

Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams

Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams 2025-09-04 at 15:03 By SecurityWeek News The Israeli startup’s AI-powered no-code platform helps security teams design and deploy custom apps in minutes—tackling tool sprawl without heavy engineering. The post Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams appeared first

React to this headline:

Loading spinner

Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams Read More »

Sola Security Rases $35M to Bring No-Code App Building to Cybersecurity Teams

Sola Security Rases $35M to Bring No-Code App Building to Cybersecurity Teams 2025-09-04 at 14:48 By SecurityWeek News The Israeli startup’s AI-powered no-code platform helps security teams design and deploy custom apps in minutes—tackling tool sprawl without heavy engineering. The post Sola Security Rases $35M to Bring No-Code App Building to Cybersecurity Teams appeared first

React to this headline:

Loading spinner

Sola Security Rases $35M to Bring No-Code App Building to Cybersecurity Teams Read More »

Cato Networks Acquires AI Security Firm Aim Security

Cato Networks Acquires AI Security Firm Aim Security 2025-09-03 at 16:45 By Mike Lennon Founded in 2022 to help organizations with the secure deployment of generative-AI utilities, Aim emerged from stealth in January 2024. The post Cato Networks Acquires AI Security Firm Aim Security appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Cato Networks Acquires AI Security Firm Aim Security Read More »

Trustwave Security Colony’s 8 Commandments for AI Adoption

Trustwave Security Colony’s 8 Commandments for AI Adoption 2025-09-03 at 16:14 By Trustwave Security Colony’s 8 Commandments for Artificial Intelligence adoption help organizations reduce risks while improving business outcomes. Align your cybersecurity strategy with responsible AI policies to ensure safe, ethical, and compliant use of technology. Strengthen resilience by integrating artificial intelligence adoption guidelines with

React to this headline:

Loading spinner

Trustwave Security Colony’s 8 Commandments for AI Adoption Read More »

BruteForceAI: Free AI-powered login brute force tool

BruteForceAI: Free AI-powered login brute force tool 2025-09-03 at 09:31 By Help Net Security BruteForceAI is a penetration testing tool that uses LLMs to improve the way brute-force attacks are carried out. Instead of relying on manual setup, the tool can analyze HTML content, detect login form selectors, and prepare the attack process automatically. It

React to this headline:

Loading spinner

BruteForceAI: Free AI-powered login brute force tool Read More »

AI will drive purchases this year, but not without questions

AI will drive purchases this year, but not without questions 2025-09-03 at 07:04 By Sinisa Markovic AI is moving into security operations, but CISOs are approaching it with a mix of optimism and realism. A new report from Arctic Wolf shows that most organizations are exploring or adopting AI-driven tools, yet many still see risks

React to this headline:

Loading spinner

AI will drive purchases this year, but not without questions Read More »

Can AI agents catch what your SOC misses?

Can AI agents catch what your SOC misses? 2025-09-02 at 10:45 By Mirko Zorz A new research project called NetMoniAI shows how AI agents might reshape network monitoring and security. Developed by a team at Texas Tech University, the framework brings together two ideas: distributed monitoring at the edge and AI-driven analysis at the center.

React to this headline:

Loading spinner

Can AI agents catch what your SOC misses? Read More »

Scroll to Top