Tag: ai
-
Google wipes out 602 million scam ads with Gemini on duty
Google claims that its security teams work around the clock using its Gemini AI models to detect and stop harmful ads. >>Bad actors are using generative AI to create … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/17/google-gemini-harmful-ads-blocking/
-
Thunderbolt: Mozilla veröffentlicht Open-Source-KI-Client
Mit der Integration in Haystack des deutschen Unternehmens Deepset will Mozilla eine Alternative zu großen KI-Enterprise-Produkten bieten. First seen on golem.de Jump to article: www.golem.de/news/thunderbolt-mozilla-veroeffentlicht-open-source-ki-client-2604-207695.html
-
Mozilla challenges enterprise AI providers with Thunderbolt, open-source AI client under your control
For organizations that want to keep company data within their own systems and have more control over how AI is deployed, Mozilla is offering an alternative to externally … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/17/mozilla-thunderbolt-open-source-ai-client-enterprise-data-control/
-
Critical Flowise Flaw Enables Remote Command Execution via MCP Adapters
OX Security researchers have uncovered a critical, systemic vulnerability built directly into the architecture of Anthropic’s Model Context Protocol (MCP). As the industry standard for AI agent communication, this foundational flaw exposes systems to Arbitrary Command Execution (RCE). Attackers who exploit this vulnerability can seize complete control of affected MCP implementations, gaining direct access to…
-
KI und das Ende der digitalen Sicherheit, wie wir sie kennen – Claude Mythos markiert eine Zäsur für die Cybersicherheit
First seen on security-insider.de Jump to article: www.security-insider.de/claude-mythos-anthropic-zaesur-cybersicherheit-kipker-a-f987e7d54801adb58cd67b4c51407cea/
-
Hackers Deploy ATHR for Scalable AI-Driven Vishing and Credential Theft
Tags: ai, attack, automation, credentials, cyber, cybercrime, email, hacker, malicious, phishing, theftHackers are increasingly turning to telephone-oriented attack delivery (TOAD) to bypass traditional email security, and a new cybercrime platform called ATHR is accelerating this trend with AI-driven automation and integrated phishing capabilities. TOAD attacks rely on a simple but effective tactic: instead of embedding malicious links or attachments, attackers send benign-looking emails containing only a…
-
Resiliente Datenstrategie – ‘Agentische KI verlangt neue Maßstäbe für die Datensicherung”
Tags: aiFirst seen on security-insider.de Jump to article: www.security-insider.de/agentische-ki-verlangt-neue-massstaebe-fuer-die-datensicherung-a-e0c8c39cb02ac59ad549c02154590626/
-
Wenn Maschinen täuschen: Wie KI die Phishing-Welle antreibt und was jetzt schützt
Trotzdem bleibt ein entscheidender Faktor bestehen: der Mensch. Denn so ausgefeilt die Technik auch ist letztlich zielen Phishing-Angriffe immer auf Mitarbeitende First seen on infopoint-security.de Jump to article: www.infopoint-security.de/wenn-maschinen-taeuschen-wie-ki-die-phishing-welle-antreibt-und-was-jetzt-schuetzt/a44680/
-
Google Deploys Gemini AI to Stop Threat Actors, Blocking 8.3 Billion Ads
Google has significantly escalated its fight against cybercriminals, deploying its advanced Gemini AI to neutralize malicious advertising campaigns. By leveraging generative AI, the tech giant intercepted more than 99% of these harmful advertisements before they ever reached end users. This milestone marks a major shift in how cybersecurity defenses handle automated threats. Threat actors have…
-
New infosec products of the week: April 17, 2026
Here’s a look at the most interesting products from the past week, featuring releases from Axonius, Broadcom, Siemens, and Sitehop. Axonius updates Asset Cloud with AI, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/17/new-infosec-products-of-the-week-april-17-2026/
-
New infosec products of the week: April 17, 2026
Here’s a look at the most interesting products from the past week, featuring releases from Axonius, Broadcom, Siemens, and Sitehop. Axonius updates Asset Cloud with AI, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/17/new-infosec-products-of-the-week-april-17-2026/
-
Zero-Knowledge Proofs for Privacy-Preserving AI Tool Execution
Learn how Zero-Knowledge Proofs (ZKPs) secure MCP deployments and AI tool execution against quantum threats while preserving data privacy. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/zero-knowledge-proofs-for-privacy-preserving-ai-tool-execution/
-
The Shadow AI Trap: Why Your AI Inventory is Your Biggest EU AI Act Compliance Risk FireTail Blog
Tags: access, ai, api, automation, ciso, cloud, compliance, computing, control, data, governance, grc, infrastructure, LLM, monitoring, risk, risk-management, saas, service, software, toolApr 16, 2026 – Alan Fagan – The EU AI Act cares about evidence, not intentWhen National Competent Authorities begin enforcement on August 2, 2026, they will ask organisations what AI systems they operate, how those systems are being used, and what controls are in place. Many organisations will struggle to answer these questions.The Shadow…
-
The Shadow AI Trap: Why Your AI Inventory is Your Biggest EU AI Act Compliance Risk FireTail Blog
Tags: access, ai, api, automation, ciso, cloud, compliance, computing, control, data, governance, grc, infrastructure, LLM, monitoring, risk, risk-management, saas, service, software, toolApr 16, 2026 – Alan Fagan – The EU AI Act cares about evidence, not intentWhen National Competent Authorities begin enforcement on August 2, 2026, they will ask organisations what AI systems they operate, how those systems are being used, and what controls are in place. Many organisations will struggle to answer these questions.The Shadow…
-
Article 12 and the Logging Mandate: What the EU AI Act Actually Requires FireTail Blog
Tags: access, ai, breach, ciso, cloud, compliance, control, data, data-breach, finance, GDPR, grc, healthcare, infrastructure, insurance, jobs, metric, monitoring, regulation, risk, saas, service, toolApr 16, 2026 – Lina Romero – When GDPR arrived, the organisations that had mistaken documentation for capability were the ones that struggled the most. They had policies about data retention but no technical controls enforcing those policies. They had breach notification procedures but no systems capable of detecting a breach in time to use…
-
Beyond the Spreadsheet: Why Manual AI Audits Are an EU AI Act Compliance Liability FireTail Blog
Tags: access, ai, ciso, cloud, compliance, control, data, detection, finance, framework, GDPR, governance, grc, group, incident response, infrastructure, ISO-27001, monitoring, regulation, risk, saas, service, soc, toolApr 16, 2026 – Alan Fagan – When it comes to the EU AI Act, many organisations take a manual approach to auditing, which looks impressive on paper but collapses under regulatory scrutiny. They use policies, surveys, working groups, and a well-formatted risk register. However, a manual approach does not provide the continuous, automated, technical…
-
Beyond the Spreadsheet: Why Manual AI Audits Are an EU AI Act Compliance Liability FireTail Blog
Tags: access, ai, ciso, cloud, compliance, control, data, detection, finance, framework, GDPR, governance, grc, group, incident response, infrastructure, ISO-27001, monitoring, regulation, risk, saas, service, soc, toolApr 16, 2026 – Alan Fagan – When it comes to the EU AI Act, many organisations take a manual approach to auditing, which looks impressive on paper but collapses under regulatory scrutiny. They use policies, surveys, working groups, and a well-formatted risk register. However, a manual approach does not provide the continuous, automated, technical…
-
Kollege KI: Jeder vierte Erwerbstätige setzt bei wichtigen Fragen zuerst Vertrauen in einen Chatbot
Tags: aiFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/kollege-ki-26-prozent-erwerbstaetige-vertrauen-chatbot
-
KI entdeckt jahrzehntealte Sicherheitslücken. Der Wendepunkt für Cybersecurity
Kommentar von Heather Ceylan, CISO at Box Mit Claude Mythos hat Anthropic ein KI-Modell vorgestellt, das in der Lage ist, tief in Codebasen einzutauchen und selbst hochkomplexe, bislang unentdeckte Schwachstellen aufzuspüren. Zwischen 16 und 27 Jahre alte Bugs und Schwachstellen, die in zentraler Infrastruktur existierten und weder durch menschliche Experten noch durch bestehende Tools… First…
-
Curity looks to reinvent IAM with runtime authorization for AI agents
Multiple approaches to agent security: Today, agent security falls into one of several camps, which include increasingly inadequate inline approaches such as API gateways and web application firewalls (WAFs), and out-of-band analysis systems that infer intent by analyzing agent behavior against a baseline.Curity’s Access Intelligence, by contrast, is a self-hosted microservice that acts as a…
-
Statements zu den Cybersecurity-Gefahren von Agentic-AI
KI-Agenten übernehmen bereits zahlreiche Prozesse im Unternehmen. Mit Agentic-AI werden diese Prozesse zu komplexen Workflows kombiniert. Ist diese autonome Automatisierung überhaupt zielführend oder erwachsen Unternehmen daraus zahlreiche neue Probleme? Mit dieser Frage hat Netzpalaver seine Community-Mitglieder um ihre Meinung mit einem kurzen Video-Statement zu Agentic-AI gebeten. Statement von Michael Veit, Technology Analyst bei Sophos […]…
-
Anthropic releases Claude Opus 4.7 with automated cybersecurity safeguards
Software teams building agentic AI workflows have been pushing frontier models toward longer, unsupervised task runs. Claude Opus 4.7, now generally available from Anthropic, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/16/claude-opus-4-7-released/
-
»Human in the Loop« verwandelt KI in einen steuerbaren Schlüsselfaktor
Eine aktuelle Studie des Branchenverbands Bitkom zeigt, dass viele Nutzer dem Einsatz von KI weiterhin skeptisch gegenüberstehen [1]. Zugleich verbindet sich mit der Technologie das Risiko sogenannter Halluzinationen und fehlerhafter Ergebnisse. Der Ansatz »Human in the Loop« minimiert diese Vorbehalte und Risiken weitgehend durch Kontrolle der Ergebnisse und Training von KI-Modellen, wie Thomas Uber, Geschäftsführer……
-
Curity looks to reinvent IAM with runtime authorization for AI agents
Multiple approaches to agent security: Today, agent security falls into one of several camps, which include increasingly inadequate inline approaches such as API gateways and web application firewalls (WAFs), and out-of-band analysis systems that infer intent by analyzing agent behavior against a baseline.Curity’s Access Intelligence, by contrast, is a self-hosted microservice that acts as a…
-
Ransomware-Bedrohungen und KI-Transformation verschieben Fokus von Recovery hin zu Resilienz
Der neue ‘Veeam Data Trust and Resilience Report” von Veeam Software stellt fest, dass 90 Prozent der Sicherheitsverantwortlichen davon überzeugt sind, Daten schnell wiederherstellen zu können. Allerdings schaffen es letztlich nur 28 Prozent, die Daten nach einem Ransomware-Angriff auch tatsächlich vollständig wiederherzustellen. Veeam hat den ‘Data Trust and Resilience Report 2026″ veröffentlicht, der eine wachsende…
-
Anthropic tests user trust with ID and selfie checks for Claude
Anthropic announced identity verification for Claude using government ID and selfie checks, becoming the first major AI chatbot to do so, a move that may prove unpopular with … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/16/anthropic-claude-identity-verification-government-id/
-
AI Risk Management in SaaS: A Practical Guide
Learn how to manage AI risk in SaaS environments across identity, access, and integrations. A practical guide for modern AI governance. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/ai-risk-management-in-saas-a-practical-guide/
-
Cyberrisiko Digitalisierung und KI warum Identitäten zum zentralen Sicherheitsfaktor in Kliniken werden
Tags: aiStatement zur DMEA 2026 von Olaf Milde, Manager Solutions Engineering Central Europe bei Imprivata Mit der wachsenden digitalen Vernetzung der Akteure im Gesundheitswesen und dem Einsatz von KI-Agenten steigt auch die Angriffsfläche für Cyberkriminelle. Krankenhäuser gelten heute als besonders attraktive Ziele für Angreifer: Sie verarbeiten hochsensible Patientendaten, betreiben komplexe IT-Infrastrukturen und sind gleichzeitig auf… First…
-
Curity looks to reinvent IAM with runtime authorization for AI agents
Multiple approaches to agent security: Today, agent security falls into one of several camps, which include increasingly inadequate inline approaches such as API gateways and web application firewalls (WAFs), and out-of-band analysis systems that infer intent by analyzing agent behavior against a baseline.Curity’s Access Intelligence, by contrast, is a self-hosted microservice that acts as a…
-
AgentManager schützt die hybride Belegschaft aus Menschen und KI-Agenten
Der Anbieter der weltweit bekannten Plattform, die sich umfassend mit dem Human-Risk-Management und KI-Agenten befasst, KnowBe4, führt den Agent-Risk-Manager ein. Das branchenweit erste Verteidigungssystems, das darauf ausgelegt ist, das Verhalten autonomer KI-Agenten zu sichern, zu überwachen und zu steuern. Der Agent-Risk-Manager ist ein Eckpfeiler der KnowBe4-HRM+-Plattform und verändert grundlegend, wie Unternehmen die Risiken der menschlichen…

