Security agencies draw red lines around agentic AI deployments
With prompt injection and other attack pathways consistently surfacing across agentic AI deployments, security watchdogs have […]
The fake IT worker problem CISOs can’t ignore
Hiring fake IT workers has been a growing problem in recent years — but it’s often […]
How CISOs should utilize data security posture management to inform risk
Every CISO eventually faces the same tension: You know your security program needs to mature, but […]
Was ist ein Botnet?
Ein Botnetz besteht aus vielen “Zombie”-Rechnern und lässt sich beispielsweise einsetzen, um DDoS-Attacken zu fahren. Das […]
What is XDR (Extended Detection and Response) in Cybersecurity? A Quick Guide
Extended Detection and Response (XDR) Explained Extended Detection and Response (XDR) is a comprehensive security solution […]
AI agents can bypass guardrails and put credentials at risk, Okta study finds
An AI agent that revealed sensitive data without being asked. An agent that overruled its own […]
Windows shell spoofing vulnerability puts sensitive data at risk
Microsoft and the US Cybersecurity and Infrastructure Security Agency (CISA) have sounded the alarm about a […]
OpenAI Tries to Exorcise Goblins, Gremlins, and Trolls From ChatGPT
OpenAI’s latest artificial intelligence has spent the last few months seeing monsters in the machine… literally. […]
NSA Tests Anthropic’s Mythos Model on Microsoft Security Flaws
The National Security Agency (NSA) has reportedly been testing Anthropic’s Mythos model to identify cybersecurity vulnerabilities […]
Human-centric failures: Why BEC continues to work despite MFA
Business email compromise (BEC) is still thriving even in organizations that have implemented multi-factor authentication (MFA). […]