Tag: ai
-
How to de-identify financial documents with Tonic Textual
Financial documents are rich with insight but packed with PII. This guide shows how to safely de-identify bank statements and financial text using Tonic Textual for compliant analytics and AI workflows. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/how-to-de-identify-financial-documents-with-tonic-textual/
-
IRONSCALES Adds Three AI Agents Trained to Automate Cybersecurity Tasks
IRONSCALES today revealed it has developed three artificial intelligence (AI) agents for its email security platform, including one that conducts red team attacks to uncover vulnerabilities and weaknesses that adversaries can exploit. Audian Paxson, principal technical strategist for IRONSCALES, said with the Winter 2026 release of the company’s platform, cybersecurity teams will also be able..…
-
Code in Nischensprachen hebelt Anomalieerkennung aus
Die offenbar vom pakistanischen Staat unterstützte Malware-Gruppe APT36 setzt bei der Entwicklung ihrer Malware jetzt auf künstliche Intelligenz. Zu diesem Ergebnis kommt eine aktuelle Analyse der Bitdefender Labs. Ein KI-Modell unterstützt die Akteure, Malware in industriellem Ausmaß zu generieren. Verfügbare Malware lässt sich in gering verbreitete Programmiersprachen übersetzen sowie betriebssystemunabhängig und damit effektiv verbreiten. Beweise…
-
Jedes zweite Unternehmen stoppt Projekte mit künstlicher Intelligenz wegen Sicherheits- und Governance-Bedenken
51 Prozent der Unternehmen weltweit haben KI-basierte Änderungen in Microsoft-365 aufgrund von Sicherheits- oder Governance-Bedenken rückgängig gemacht (Deutschland: 46 %). Gleichzeitig sehen knapp drei Viertel (70 %) der IT-Verantwortlichen in einem KI-gesteuerten Management enorme Vorteile für die eigenen Prozesse. Zu diesen und weiteren Ergebnissen kommt der neue Report ‘2026 State of AI in Microsoft 365″…
-
Interview with Tom Howe of Hydrolix: AI Bots, the Friends, Foes, and Frenemies of Online Shopping
Hydrolix expert Tom Howe explains how AI bots impact ecommerce, how to spot good vs malicious bots, and why blocking them can hurt sales. First seen on hackread.com Jump to article: hackread.com/interview-tom-howe-hydrolix-ai-bots-online-shopping/
-
Codenotary Trust delivers autonomous AI security for Linux and Kubernetes
Codenotary has announced Codenotary Trust, a unified SaaS platform that uses AI to instantly detect, prioritize, and autonomously fix security, configuration, and performance … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/05/codenotary-trust-saas-platform/
-
DataDome and Botify Partner to Give Businesses Full Control Over Agentic Commerce, from Discovery to Transaction
DataDome and Botify partner to help businesses optimize agentic commerce”, ensuring AI agents can discover products and transact securely. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/datadome-and-botify-partner-to-give-businesses-full-control-over-agentic-commerce-from-discovery-to-transaction/
-
DataDome and Botify Partner to Give Businesses Full Control Over Agentic Commerce, from Discovery to Transaction
DataDome and Botify partner to help businesses optimize agentic commerce”, ensuring AI agents can discover products and transact securely. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/datadome-and-botify-partner-to-give-businesses-full-control-over-agentic-commerce-from-discovery-to-transaction/
-
Inside the Updated AI Governance Suite Dashboard – Kovrr
Articles related to cyber risk quantification, cyber risk management, and cyber resilience. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/inside-the-updated-ai-governance-suite-dashboard-kovrr/
-
ContextCrush Flaw Exposes AI Development Tools to Attacks
Critical flaw ContextCrush in Context7 MCP Server could allow malicious instructions into AI tools First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/contextcrush-ai-development-tools/
-
ContextCrush Flaw Exposes AI Development Tools to Attacks
Critical flaw ContextCrush in Context7 MCP Server could allow malicious instructions into AI tools First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/contextcrush-ai-development-tools/
-
Deepfakes im Netz: Wenn KI Realität manipuliert – warum neue Hilfsangebote dringend nötig sind
Während KI enorme Chancen bietet, wächst gleichzeitig das Risiko für Missbrauch. Projekte wie DEEP-PRISMA versuchen daher, genau diese Lücke zu schließen: mit Forschung, mit konkreten Hilfsangeboten und mit neuen Ideen für besseren Schutz im digitalen Raum. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/deepfakes-im-netz-wenn-ki-realitaet-manipuliert-warum-neue-hilfsangebote-dringend-noetig-sind/a43956/
-
AWS backs Open VSX as Rust survey shows VS Code decline
AI-first editors and agent-driven tooling intensify competition in the IDE market First seen on theregister.com Jump to article: www.theregister.com/2026/03/03/open_vsx_aws/
-
Shift Left Has Shifted Wrong: Why AppSec Teams Not Developers Must Lead Security in the Age of AI Coding
Narrow “shift left” has failed at AI scale. Move from developer-led fixes to AppSec-managed automation that triages findings and delivers tested pull-request fixes so teams can safely manage AI-generated code. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/shift-left-has-shifted-wrong-why-appsec-teams-not-developers-must-lead-security-in-the-age-of-ai-coding/
-
AI Governance Guide: Principles Frameworks
Learn what AI governance is, core principles, and how to build an AI governance framework that manages risk, identity, SaaS access, and continuous oversight. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/ai-governance-guide-principles-frameworks/
-
The Real Shadow AI Problem: Too Much Access
Shadow AI isn’t just about unapproved tools. It’s about excessive access. Learn how OAuth, identity sprawl, and SaaS integrations create hidden AI risk. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/the-real-shadow-ai-problem-too-much-access/
-
Discover Exposed AI Infrastructure with Indusface WAS
Indusface WAS now detects exposed AI servers like Ollama across your attack surface, helping security teams identify publicly accessible AI infrastructure early. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/discover-exposed-ai-infrastructure-with-indusface-was/
-
Discover Exposed AI Infrastructure with Indusface WAS
Indusface WAS now detects exposed AI servers like Ollama across your attack surface, helping security teams identify publicly accessible AI infrastructure early. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/discover-exposed-ai-infrastructure-with-indusface-was/
-
UK watchdog eyes Meta’s smart glasses after workers say they ‘see everything’
Contractors tasked with improving AI reportedly had access to intimate footage captured through wearables First seen on theregister.com Jump to article: www.theregister.com/2026/03/05/ico_meta_glasses/
-
As AI agents start making purchases, security teams must rethink risk
In this Help Net Security interview, Donald Kossmann, CTO at fintech company Chargebacks911, talks about the emerging security, fraud, and governance risks of >>agentic … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/05/donald-kossmann-chargebacks911-agentic-commerce-security-risks/
-
Threat Report 2026: KI und Botnetze treiben die Industrialisierung von Cyberangriffen
Die erste Version des Cloudflare Threat Reports 2026 basiert auf Telemetriedaten aus einem Netzwerk, das rund 20 Prozent des weltweiten Internet-Traffics verarbeitet eine der größten verfügbaren Datenquellen zur globalen Bedrohungslage [1]. Er beschreibt eine zunehmend industrialisierte Cyberbedrohungslandschaft, in der Effizienz und Skalierbarkeit wichtiger sind als technische Raffinesse. Anstelle komplexer Einzelangriffe setzen Akteure immer mehr… First…
-
Engineering trust: A security blueprint for autonomous AI agents
AI agents have evolved from just chatbots, answering questions to executing actions using various integrated tools, often autonomously, and as such the traditional security … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/05/securing-autonomous-ai-agents/
-
How free are companies to choose their Agentic AI security solutions
How Secure Are Your Non-Human Identities? Have you ever wondered how secure your organization’s machine identities are? With the increasing reliance on cloud environments, maintaining the security of these Non-Human Identities (NHIs) is more crucial than ever. NHIs play a fundamental role in cybersecurity, functioning as the machine equivalent of human identities and requiring robust……
-
Is investing in advanced AI cybersecurity justified
Are You Safeguarding Your Business With Non-Human Identities? Have you ever wondered how secure your organization’s systems are against non-human threats? Where the interaction between machines and systems is increasing, Non-Human Identities (NHIs) have become a critical focus for cybersecurity. These machine identities are pivotal in managing cybersecurity risks, especially where companies increasingly operate in……
-
What support systems are in place for managing Agentic AI risks
Are Organizations Truly Equipped to Manage Agentic AI Risks? The rise of Agentic AI has transformed various industries, posing both opportunities and challenges. While we delve into the intricacies of managing these AI systems, it’s critical to consider whether organizations have the right structures in place to handle potential risks effectively. This responsibility often falls……
-
Agentic AI Emerges as the Next Frontier for State Government IT
State CIOs Are Exploring How AI Agents Can Boost Productivity, Efficiency. Reputation aside, most pen pushers in state governments don’t actually like pushing paper. They also don’t care to force citizens to fill out forms in triplicate. Two decades of promises to minimize those chores may be on the cusp of gloriously coming true with…
-
How a Single Overprivileged Service Turned the LexisNexis Breach Into a Keysthe-Kingdom Moment
3 min readLegal AI solutions provider LexisNexis has confirmed a massive breach of its AWS environment According to reports, initial access was gained by exploiting the “React2Shell” vulnerability in an unpatched React frontend application a flaw the company had reportedly left unaddressed for months. Among the details reportedly posted by the attacker is the claim…
-
6 Minutes and a Prayer: The Math Your SOC Doesn’t Want You to See
Your SOC can’t triage every alert, the math proves it. See why 75% of alerts go uninvestigated and how AI-autonomous triage closes the gap. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/6-minutes-and-a-prayer-the-math-your-soc-doesnt-want-you-to-see/
-
Perplexity Comet Browser Bug Leaks Local Files via AI Prompt Injection
A prompt injection attack in Perplexity’s Comet browser can trick its AI agent into leaking sensitive local files. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/artificial-intelligence/perplexity-comet-browser-bug-leaks-local-files-via-ai-prompt-injection/

