Tag: ai
-
Tenable Launches Hexa AI, an Agentic Orchestration Engine Inside Tenable One
Tenable has announced Tenable Hexa AI, an agentic AI engine built into the Tenable One Exposure Management Platform. The announcement was made at RSAC 2026 in San Francisco. Tenable Hexa AI functions as an orchestration layer that connects exposure intelligence to action. Powered by Tenable’s Exposure Data Fabric, the engine understands how vulnerabilities, identities, assets,..…
-
Nudge Security Adds AI Agent Discovery to Surface Shadow Agents and Their Risks Across the Enterprise
Nudge Security has announced new AI agent discovery capabilities, giving security teams a way to find, assess, and govern AI agents as employees deploy them across the enterprise. The announcement came at RSAC 2026 in San Francisco. The new capabilities extend Nudge Security’s existing SaaS and AI security governance platform into the agentic layer. Security..…
-
You Can’t Monetize What You Can’t See: AI Traffic Detection for Publishers
You can’t monetize what you can’t see. Learn how DataDome’s AI traffic detection helps publishers control access, stop content theft, and turn risk into revenue. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/you-cant-monetize-what-you-cant-see-ai-traffic-detection-for-publishers/
-
AI Tidal Wave: What Defenders Must Do Now
Phil Venables of Ballistic Ventures on the Second-Order Consequences of AI. AI is not just transforming how organizations operate, it’s fundamentally altering the cybersecurity landscape, said Phil Venables, partner at Ballistic Ventures. The consequences, he warned, are only beginning to emerge. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ai-tidal-wave-what-defenders-must-do-now-a-31166
-
Paid AI Accounts Are Now a Hot Underground Commodity
AI accounts are becoming part of the cybercrime supply chain, sold like email accounts or VPS access. Flare Systems shows how underground markets bundle and resell premium AI access at scale. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/paid-ai-accounts-are-now-a-hot-underground-commodity/
-
Why AI Is Increasing Demand for Software Engineers (Not Replacing Them)
AI Is Not Replacing Engineers. It’s Raising the Stakes Every few years, a new technology triggers the same question in boardrooms and leadership discussions: will…Read More First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2026/03/why-ai-is-increasing-demand-for-software-engineers-not-replacing-them/
-
Why AI agents are one prompt away from ransomware
As AI adoption advances beyond chatbots, security leaders are up against rogue AI agents mirroring threat actors and a generational skills gap as security operations teams become overly dependent on AI First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366640722/Why-AI-agents-are-one-prompt-away-from-ransomware
-
AI-Native Security Is a Must to Counter AI-Based Attacks
Attacks by artificial intelligence agents are a reality. Experts at Nvidia’s GTC conference say defenders need to use the same tools to fight them off. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/ai-native-security-counter-attacks
-
KI-Agenten zur sicheren Validierung von Sicherheitslücken und autonomer Behebung
Qualys hat ‘Agent Val” als Teil von ‘Enterprise TruRisk Management” (ETM) eingeführt. Agent-Val ermöglicht dem Risk-Operations-Center (ROC) eine sichere, agentengesteuerte Exploit-Validierung und autonome Risikobehebung. Agent-Val steht für einen grundlegenden Wandel im Schwachstellen- und Risikomanagement: weg von einer auf Annahmen basierenden Priorisierung, hin zu einer evidenzbasierten Umsetzung. Dies beschleunigt die Reaktion, reduziert unnötigen Aufwand und führt…
-
KI-gestützte Malware ist fester Bestandteil im Werkzeugkasten von Cyberkriminellen
KI verändert aktuell nicht nur die Qualität von Malware, sondern auch ihre Verfügbarkeit: Neue Analysen von Arctic Wolf zeigen, dass sich KI-gestützte Malware von einem Experiment zu einem festen Bestandteil im Werkzeugkasten von Angreifern entwickelt hat und dass dadurch die Hürde für Cyberkriminalität deutlich sinkt. Im Fokus steht dabei ein struktureller Wandel: Angreifer nutzen KI,…
-
Check Point etabliert Intelligenzebene, um agentenbasierte Systeme zu sichern
Check Point Software Technologies hat <> vorgestellt. Diese einheitliche KI-Sicherheitssteuerungsebene unterstützt Unternehmen dabei, die Vernetzung, Bereitstellung und den Betrieb von KI im gesamten Unternehmen zu steuern. Da sich KI-Systeme von Assistenten zu autonomen Akteuren entwickeln, die auf Daten zugreifen, Tools aufrufen und eigenständig handeln, bietet die Lösung die erforderliche Intelligenzebene, um […] First seen on…
-
SAP already shifting focus from ERP migration disaster in pursuit of AI-driven growth
New commercial models planned after cloud transition falls Euro2B behind target First seen on theregister.com Jump to article: www.theregister.com/2026/03/24/sap_commercial_focus/
-
2026 Cybersecurity Excellence Awards Winners Announced during RSA Conference as AI Security Dominates
San Francisco, USA, 25th March 2026, CyberNewswire First seen on hackread.com Jump to article: hackread.com/2026-cybersecurity-excellence-awards-winners-announced-during-rsa-conference-as-ai-security-dominates/
-
CSA Launches CSAI Foundation for AI Security
Cloud Security Alliance creates dedicated nonprofit to govern autonomous AI agent ecosystems through risk intelligence and certification First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/csa-launches-csai-ai-security
-
The Kill Chain Is Obsolete When Your AI Agent Is the Threat
In September 2025, Anthropic disclosed that a state-sponsored threat actor used an AI coding agent to execute an autonomous cyber espionage campaign against 30 global targets. The AI handled 80-90% of tactical operations on its own, performing reconnaissance, writing exploit code, and attempting lateral movement at machine speed.This incident is worrying, but there’s a scenario…
-
Databricks steigt mit dem agentenbasierten SIEM <> in den Security-Markt ein
Databricks führt Lakewatch ein. Das neue, offene, agentenbasierte SIEM-System (Security-Information and Event-Management) soll Unternehmen dabei unterstützen, sich gegen immer raffiniertere Angreifer zu verteidigen. Lakewatch vereint Sicherheits-, IT- und Geschäftsdaten in einer einzigen, kontrollierten Umgebung für KI-gestützte Erkennung und Reaktion. Dank offener Formate und eines offenen Ökosystems ermöglicht Lakewatch die Erfassung, Speicherung und Analyse beispielloser Mengen…
-
6 key trends reshaping the IAM market
Tags: access, ai, attack, authentication, ciso, compliance, corporate, cyber, cybersecurity, data, dora, finance, framework, governance, government, Hardware, iam, identity, mfa, mobile, network, nis-2, passkey, password, PCI, phone, regulation, saas, service, startup, strategy, technologyPasswordless authentication on the rise: Passwords have long been the weakest link in most security architectures.Many mobile phones and laptops already use biometrics for authentication, and the user experience is typically far better than typing a long and complex password into an interface.The growing uptake of passwordless authentication (FIDO2/passkeys, biometrics) is redefining the scope of…
-
6 key trends reshaping the IAM market
Tags: access, ai, attack, authentication, ciso, compliance, corporate, cyber, cybersecurity, data, dora, finance, framework, governance, government, Hardware, iam, identity, mfa, mobile, network, nis-2, passkey, password, PCI, phone, regulation, saas, service, startup, strategy, technologyPasswordless authentication on the rise: Passwords have long been the weakest link in most security architectures.Many mobile phones and laptops already use biometrics for authentication, and the user experience is typically far better than typing a long and complex password into an interface.The growing uptake of passwordless authentication (FIDO2/passkeys, biometrics) is redefining the scope of…
-
6 key trends reshaping the IAM market
Tags: access, ai, attack, authentication, ciso, compliance, corporate, cyber, cybersecurity, data, dora, finance, framework, governance, government, Hardware, iam, identity, mfa, mobile, network, nis-2, passkey, password, PCI, phone, regulation, saas, service, startup, strategy, technologyPasswordless authentication on the rise: Passwords have long been the weakest link in most security architectures.Many mobile phones and laptops already use biometrics for authentication, and the user experience is typically far better than typing a long and complex password into an interface.The growing uptake of passwordless authentication (FIDO2/passkeys, biometrics) is redefining the scope of…
-
6 key trends reshaping the IAM market
Tags: access, ai, attack, authentication, ciso, compliance, corporate, cyber, cybersecurity, data, dora, finance, framework, governance, government, Hardware, iam, identity, mfa, mobile, network, nis-2, passkey, password, PCI, phone, regulation, saas, service, startup, strategy, technologyPasswordless authentication on the rise: Passwords have long been the weakest link in most security architectures.Many mobile phones and laptops already use biometrics for authentication, and the user experience is typically far better than typing a long and complex password into an interface.The growing uptake of passwordless authentication (FIDO2/passkeys, biometrics) is redefining the scope of…
-
Could AI Replace the CEO? Zuckerberg’s ‘CEO Agent’ Sparks Debate
Mark Zuckerberg is building a personal AI agent to help him run Meta, and the move has reignited a debate that the tech industry has long been circling: could AI one day replace the most senior roles in business? According to reports, the still-in-development system is designed to help Zuckerberg access information more quickly, cutting…
-
Experts Sound Alarm Over “Prompt Poaching” Browser Extensions
Expel has warned of malicious Chrome extensions stealing users’ AI conversations First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/experts-prompt-poaching-browser/
-
Experts Sound Alarm Over “Prompt Poaching” Browser Extensions
Expel has warned of malicious Chrome extensions stealing users’ AI conversations First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/experts-prompt-poaching-browser/
-
KnowBe4 automatisiert Sicherheitsprozesse mit AIDA – Ausbau der KI-Agenten
Auf der RSA Conference in San Francisco macht KnowBe4 klar, wohin die Reise in der IT-Sicherheit geht: weg von reaktiven Prozessen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/knowbe4-automatisiert-sicherheitsprozesse-mit-aida-ausbau-der-ki-agenten/a44329/
-
AI is breaking traditional security models, Here’s where they fail first
AI triage redefines the security team’s role : As AI systems increasingly triage vulnerabilities with high confidence, security teams face a subtle but consequential shift in responsibility. People no longer debate whether AI can reduce noise. It demonstrably can. The harder question is which responsibilities remain with security teams once triage is automated. Are they accountable for…
-
How one man used 10,000 bots to steal $8,000,000 from music artists
Tags: aiA man has pleaded guilty to defrauding online music streaming platforms out of more than US $8 million, after creating hundreds of thousands of songs with AI, and then using bots to play them billions of times. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/10k-bots-steal-8-million-from-music-artists
-
Anthropic trims action approval loop, lets Claude Code make the call
Tags: aiAuto mode is a new permissions feature in the Claude Code system that allows the AI to make approval decisions on a user’s behalf while safeguards review actions before … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/25/anthropic-claude-code-auto-mode-feature/
-
Anthropic cuts action approval loop, lets Claude Code make the call
Tags: aiAuto mode is a new permissions feature in the Claude Code system that allows the AI to make approval decisions on a user’s behalf while safeguards review actions before … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/25/anthropic-claude-code-auto-mode-feature/
-
Anthropic cuts action approval loop, lets Claude Code make the call
Tags: aiAuto mode is a new permissions feature in the Claude Code system that allows the AI to make approval decisions on a user’s behalf while safeguards review actions before … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/25/anthropic-claude-code-auto-mode-feature/
-
AI-Driven ‘OpenClaw Trap’ Campaign Targets Developers and Gamers via Trojanized GitHub Repos
A large-scale malware operation abusing GitHub to deliver a custom LuaJIT-based trojan to developers, gamers, and everyday users through convincing but trojanized repositories. The campaign, tracked as “TroyDen’s Lure Factory,” spans more than 300 delivery packages and uses AI-assisted lures ranging from OpenClaw deployment tools to game cheats, Roblox scripts, crypto bots, VPN crackers, and…

