Topic: ai security risks

  • WSUS Flaw Exploited, BIND 9 PoC Published in Security Review

    WSUS Flaw Exploited, BIND 9 PoC Published in Security Review

    The digital security landscape is rapidly evolving with emerging threats like biometric innovations such as EarID for identity verification and critical infrastructure risks in healthcare and smart homes, requiring proactive defense strategies. New tools and vulnerabilities are shaping cybersecur...

    Read More »
  • How CISOs Master Risk, Pressure & Board Demands

    How CISOs Master Risk, Pressure & Board Demands

    Generative AI is viewed by most CISOs as a significant security risk, leading organizations to adopt structured guardrails for controlled usage rather than outright bans. Human factors, particularly employee behavior, remain the top vulnerability in cybersecurity, with insider threats and acciden...

    Read More »
  • CISOs in Survival Mode: Navigating Risk Under Pressure

    CISOs in Survival Mode: Navigating Risk Under Pressure

    CISOs face an overwhelming threat environment where most believe a successful breach is inevitable, leading to a focus on rapid response amid frequent, high-impact attacks and low confidence in employee threat detection. Generative AI is a top priority as both a major security risk and a tool for...

    Read More »
  • AI Cybercrime & Secure Assistants: The Download

    AI Cybercrime & Secure Assistants: The Download

    AI tools are lowering the barrier to cybercrime, amplifying the scale and speed of online scams by enabling less skilled criminals to launch sophisticated attacks. Deepfake technology and AI agents with access to real-world tools present immediate security risks, enhancing existing fraud and crea...

    Read More »
  • Secure Your Identity in the Age of Smarter AI

    Secure Your Identity in the Age of Smarter AI

    AI adoption is widespread, with 82% of companies using AI agents for decision-making and efficiency, but nearly 90% report unintended actions like unauthorized data access. Effective security requires robust identity governance, including tracking AI behavior and access, yet only 44% of organizat...

    Read More »
  • Cyera Unveils AI Guardian for Comprehensive AI Security

    Cyera Unveils AI Guardian for Comprehensive AI Security

    Cyera launched AI Guardian, a security solution with AI-SPM for asset tracking and AI Runtime Protection for real-time risk mitigation, enhancing its platform for AI-driven enterprises. 61% of enterprises use generative or predictive AI, but 25% face increased AI-driven cyberatt...

    Read More »
  • Anthropic Alleges Chinese AI Firms Used Claude for Training

    Anthropic Alleges Chinese AI Firms Used Claude for Training

    Anthropic accuses three major Chinese AI firms (DeepSeek, MiniMax, and Moonshot) of creating tens of thousands of fraudulent accounts to conduct millions of unauthorized interactions with its Claude AI system for illicit model distillation. The company warns this unauthorized activity bypasses cr...

    Read More »
  • Cloud Security Is Lagging Behind

    Cloud Security Is Lagging Behind

    The rapid adoption of cloud technologies has created a significant security gap, with development velocity outpacing protective controls and leaving systems vulnerable to sophisticated, fast-moving attacks. Complex multicloud environments and accelerated software deployment, including AI-generate...

    Read More »
  • Top 10 Cybersecurity Stories of 2025: The Year's Biggest Breaches & Threats

    Top 10 Cybersecurity Stories of 2025: The Year's Biggest Breaches & Threats

    Major cybersecurity vendors withdrew from the MITRE ATT&CK Evaluations in 2025, citing the tests' growing complexity and shift toward marketing, prompting plans for reform ahead of the 2026 cycle. A widespread proxy network compromised thousands of vulnerable IoT devices to facilitate malicious a...

    Read More »
  • US & Australia Release AI Security Guidelines for Infrastructure

    US & Australia Release AI Security Guidelines for Infrastructure

    U.S. and Australian cybersecurity agencies have released joint guidelines to help critical infrastructure operators securely integrate AI tools, like machine learning models, into operational technology systems while managing new risks. The framework emphasizes key principles, including conductin...

    Read More »
  • Securing Legacy Medical Devices Beyond Patching

    Securing Legacy Medical Devices Beyond Patching

    Legacy medical devices without security patches require protective barriers and close collaboration with vendors to manage risks and plan phased replacements. A risk-based security approach supports compliance by focusing on proactive measures, staff education, and strategic risk mitigation rathe...

    Read More »
  • Salesloft & Drift Breach Results, Malicious GitHub Installers Exposed

    Salesloft & Drift Breach Results, Malicious GitHub Installers Exposed

    Major platforms like Salesloft and Drift were breached via unauthorized GitHub access, emphasizing the need for strong access controls and monitoring. A malvertising campaign in the EU is distributing fake GitHub Desktop installers to deliver malware, urging IT professionals to verify software so...

    Read More »
  • Android VPN Apps Expose Users, Apple Patches Zero-Day Exploit

    Android VPN Apps Expose Users, Apple Patches Zero-Day Exploit

    Three widely used Android VPN apps with over 700 million downloads have serious security flaws, potentially exposing sensitive user data due to hidden connections and inadequate protections. Apple patched a zero-day exploit (CVE-2025-43300) used in a sophisticated attack on high-value targets, ur...

    Read More »
  • China's Free AI Model Outperforms GPT-5 and Sonnet 4.5

    China's Free AI Model Outperforms GPT-5 and Sonnet 4.5

    Moonshot's new open-source AI model, Kimi K2 Thinking, claims to outperform top proprietary models like GPT-5 and Claude Sonnet 4.5 on key benchmarks including reasoning and information retrieval. The model is freely available, trained for just $4.6 million, and uses a Mixture-of-Experts architec...

    Read More »