Tag: ai
-
Merkliche Preiserhöhung ab Juli 2026 – Microsoft 365 für Geschäftskunden wird teurer
Mehr KI- und Sicherheitsfunktionen kündigt Microsoft für Microsoft-365- und Office-365-Lizenzen an. Die Preise verteuern sich ebenfalls. First seen on computerbase.de Jump to article: www.computerbase.de/news/apps/merkliche-preiserhoehung-ab-juli-2026-microsoft-365-fuer-geschaeftskunden-wird-teurer.95339
-
Merkliche Preiserhöhung ab Juli 2026 – Microsoft 365 für Geschäftskunden wird teurer
Mehr KI- und Sicherheitsfunktionen kündigt Microsoft für Microsoft-365- und Office-365-Lizenzen an. Die Preise verteuern sich ebenfalls. First seen on computerbase.de Jump to article: www.computerbase.de/news/apps/merkliche-preiserhoehung-ab-juli-2026-microsoft-365-fuer-geschaeftskunden-wird-teurer.95339
-
Huge Trove of Nude Images Leaked by AI Image Generator Startup’s Exposed Database
An AI image generator startup’s database was left accessible to the open internet, revealing more than 1 million images and videos, including photos of real people who had been “nudified.” First seen on wired.com Jump to article: www.wired.com/story/huge-trove-of-nude-images-leaked-by-ai-image-generator-startups-exposed-database/
-
Huge Trove of Nude Images Leaked by AI Image Generator Startup’s Exposed Database
An AI image generator startup’s database was left accessible to the open internet, revealing more than 1 million images and videos, including photos of real people who had been “nudified.” First seen on wired.com Jump to article: www.wired.com/story/huge-trove-of-nude-images-leaked-by-ai-image-generator-startups-exposed-database/
-
CrowdStrike Extends Scope of AWS Cybersecurity Alliance
CrowdStrike deepens its AWS partnership with automated Falcon SIEM configuration, AI security capabilities, EventBridge integrations and new MSSP-focused advancements. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/12/crowdstrike-extends-scope-of-aws-cybersecurity-alliance/
-
Anlagebetrüger ködern mit falscher Promi-Werbung
Cyberkriminelle sollen deutschlandweit mindestens 120 Menschen um einen Gesamtbetrag von mehr als 1,3 Millionen Euro gebracht haben.Die Werbung mit Promis für ein “geheimes Finanzprodukt” war gefälscht, Anleger verloren ihr Geld: Mutmaßliche Internet-Kriminelle sollen deutschlandweit mindestens 120 Menschen um einen Gesamtbetrag von mehr als 1,3 Millionen Euro gebracht haben. Die Ermittler gehen aber von einer hohen…
-
15 years in, zero trust remains elusive, with AI rising to complicate the challenge
Legacy systems that weren’t designed for zero trust principles,Fragmented identity and access tools that make unified enforcement difficult, andCultural and organizational resistance to changing long-standing trust models.Kyle Wickert, field CTO at AlgoSec, says zero trust remains one of the most misunderstood transformations in cybersecurity.”Many organizations still hesitate to pursue it because they associate zero trust…
-
Deepfakes oben, Zero Days unten Cyber-Eisberg wächst
Agentenbasierte KI (Agentic AI) verwandelt Cyberbedrohungen wie Phishing und Deepfakes in pausenlose Zero-Day-Exploits und automatisierte Ransomware. Die meisten Unternehmen werden damit nicht Schritt halten können. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/deepfakes-oben-zero-days-unten
-
What security leaders should watch for when companies buy or sell a business
In this Help Net Security video, Lane Sullivan SVP, CISO and Strategy Officer at Concentric AI, explains what security leaders should think about during mergers, acquisitions, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/05/ma-security-checklist-video/
-
Deepfakes oben, Zero Days unten Cyber-Eisberg wächst
Agentenbasierte KI (Agentic AI) verwandelt Cyberbedrohungen wie Phishing und Deepfakes in pausenlose Zero-Day-Exploits und automatisierte Ransomware. Die meisten Unternehmen werden damit nicht Schritt halten können. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/deepfakes-oben-zero-days-unten
-
What security leaders should watch for when companies buy or sell a business
In this Help Net Security video, Lane Sullivan SVP, CISO and Strategy Officer at Concentric AI, explains what security leaders should think about during mergers, acquisitions, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/05/ma-security-checklist-video/
-
Deepfakes oben, Zero Days unten Cyber-Eisberg wächst
Agentenbasierte KI (Agentic AI) verwandelt Cyberbedrohungen wie Phishing und Deepfakes in pausenlose Zero-Day-Exploits und automatisierte Ransomware. Die meisten Unternehmen werden damit nicht Schritt halten können. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/deepfakes-oben-zero-days-unten
-
What security leaders should watch for when companies buy or sell a business
In this Help Net Security video, Lane Sullivan SVP, CISO and Strategy Officer at Concentric AI, explains what security leaders should think about during mergers, acquisitions, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/05/ma-security-checklist-video/
-
Die wichtigsten Trends im Bereich der physischen Sicherheit für das Jahr 2026
Unternehmen werden sich auf Flexibilität, verantwortungsbewusste KI und einheitliche, vernetzte Systeme konzentrieren, um die Sicherheit und die Betriebsleistung zu verbessern. Genetec, Anbieter von Software für die physische Sicherheit, hat seine wichtigsten Prognosen für die physische Sicherheitsbranche im Jahr 2026 vorgestellt. Auswahl und Flexibilität werden die nächste Phase der Cloud-Einführung bestimmen Im Jahr 2026… First seen…
-
Das CISO-Paradoxon: Innovation ermöglichen und Risiken managen
Tags: ai, api, authentication, ciso, cyberattack, edr, encryption, firewall, governance, infrastructure, least-privilege, risk, siem, soc, update, vulnerability, waf, zero-dayCISOs sollten eng mit anderen Teams zusammenarbeiten.Eine der Hauptaufgaben von CISOs besteht darin, nicht mehr die ‘Abteilung des Neins” zu sein. Sie müssen Wege finden, die schnelle Bereitstellung von Produkten und Dienstleistungen für das Unternehmen zu ermöglichen, ohne gleichzeitig neue Risiken einzuführen.Das ist, kurz gesagt, das Paradoxon. In einem Umfeld, in dem Produktteams ständig neue…
-
New infosec products of the week: December 5, 2025
Here’s a look at the most interesting products from the past week, featuring releases from BlackFog, Datadog, Forward Edge-AI, SandboxAQ, and Upwind. BlackFog releases ADX … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/05/new-infosec-products-of-the-week-december-5-2025/
-
Die wichtigsten Trends im Bereich der physischen Sicherheit für das Jahr 2026
Unternehmen werden sich auf Flexibilität, verantwortungsbewusste KI und einheitliche, vernetzte Systeme konzentrieren, um die Sicherheit und die Betriebsleistung zu verbessern. Genetec, Anbieter von Software für die physische Sicherheit, hat seine wichtigsten Prognosen für die physische Sicherheitsbranche im Jahr 2026 vorgestellt. Auswahl und Flexibilität werden die nächste Phase der Cloud-Einführung bestimmen Im Jahr 2026… First seen…
-
Suspicious traffic could be testing CDN evasion, says expert
“Cf-Warp-Tag-Id,” which is associated with Cloudflare’s Warp VPN service;”X-Fastly-Request-Id,”, which is associated with the Fastly CDN;”X-Akamai-Transformed,” a header added by Akamai;and a puzzler: “X-T0Ken-Inf0.” Ullrich thinks it might contain a form of authentication token, but isn’t sure.In an interview, he said one explanation is that a threat actor is trying to get around a CDN’s…
-
SentinelOne CEO: SIEM, Purple AI Driving ‘Outsized’ Growth Surge
SentinelOne is seeing major contributions from products beyond its core endpoint security offering, underscoring a rise in adoption of the company’s broader Singularity platform by partners and customers, SentinelOne Co-founder and CEO Tomer Weingarten said Thursday. First seen on crn.com Jump to article: www.crn.com/news/security/2025/sentinelone-ceo-siem-purple-ai-driving-outsized-growth-surge
-
An AI for an AI: Anthropic says AI agents require AI defense
Automated software keeps getting better at pilfering cryptocurrency First seen on theregister.com Jump to article: www.theregister.com/2025/12/05/an_ai_for_an_ai/
-
Suspicious traffic could be testing CDN evasion, says expert
“Cf-Warp-Tag-Id,” which is associated with Cloudflare’s Warp VPN service;”X-Fastly-Request-Id,”, which is associated with the Fastly CDN;”X-Akamai-Transformed,” a header added by Akamai;and a puzzler: “X-T0Ken-Inf0.” Ullrich thinks it might contain a form of authentication token, but isn’t sure.In an interview, he said one explanation is that a threat actor is trying to get around a CDN’s…
-
New Phishing Campaign Impersonates India’s Income Tax Department to Distribute AsyncRAT
In November 2025, security researchers at Raven AI identified a sophisticated zero-day phishing campaign impersonating the Income Tax Department of India, targeting enterprises across the country with a multi-stage malware chain. The attack combined authentic-looking government communications with advanced evasion techniques, delivering both a shellcode-based RAT loader and a malicious executable disguised as a GoTo…
-
HHS Outlines AI Road Map Amid Major Department Overhaul
Plan Aims to Modernize Workflow, Expand AI Use Across Agencies, Improve Cyber. The U.S. Department of Health and Human Services on Thursday unveiled version 1 of a strategic plan to implement artificial intelligence as a practical layer across the department and its agencies aimed at helping to break down silos, improve collaboration and increase efficiencies.…
-
AI Agents Create Critical Supply Chain Risk in GitHub Actions
PromptPwnd shows how simple prompt injections can let attackers compromise GitHub Actions and leak sensitive data. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/ai-agents-create-critical-supply-chain-risk-in-github-actions/
-
How Agentic AI Can Boost Cyber Defense
Transurban head of cyber defense Muhammad Ali Paracha shares how his team is automating the triaging and scoring of security threats as part of the Black Hat Middle East conference. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-analytics/how-agentic-ai-can-boost-cyber-defense
-
Sen. Mark Kelly: Investing in safe, secure AI is key to U.S. dominance
The Democratic senator from Arizona believes that global AI standards must include American values around civil rights, privacy and safety. First seen on cyberscoop.com Jump to article: cyberscoop.com/mark-kelly-ai-safety-guardrails-center-for-american-progress/
-
Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1
Cloudflare CEO Matthew Prince claims the internet infrastructure company’s efforts to block AI crawlers are already seeing big results. First seen on wired.com Jump to article: www.wired.com/story/big-interview-event-matthew-prince-cloudflare/
-
CISA Publishes Security Guidance for Using AI in OT
Global cybersecurity agencies published guidance regarding AI deployments in operational technology, a backbone of critical infrastructure. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/cisa-publishes-security-guidance-ai-ot
-
AI creates new security risks for OT networks, warns NSA
Tags: ai, cisa, compliance, control, cyber, data, data-breach, government, healthcare, infrastructure, injection, intelligence, LLM, network, risk, technology, trainingPrinciples for the Secure Integration of Artificial Intelligence in Operational Technology, authored by the NSA in conjunction with the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) and a global alliance of national security agencies.While the use of AI in critical infrastructure OT is in its early days, the guidance reads like an attempt…
-
AI creates new security risks for OT networks, warns NSA
Tags: ai, cisa, compliance, control, cyber, data, data-breach, government, healthcare, infrastructure, injection, intelligence, LLM, network, risk, technology, trainingPrinciples for the Secure Integration of Artificial Intelligence in Operational Technology, authored by the NSA in conjunction with the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) and a global alliance of national security agencies.While the use of AI in critical infrastructure OT is in its early days, the guidance reads like an attempt…

