Tag: ai
-
Microsoft details AI prompt abuse techniques targeting AI assistants
Prompt abuse occurs when crafted inputs manipulate an AI system into producing unintended behavior, such as attempting to access sensitive information or overriding built-in … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/24/microsoft-ai-prompt-abuse-detection/
-
NVIDIA puts GPU orchestration in community hands
GPU-accelerated AI workloads now run on Kubernetes in the large majority of enterprise environments. Managing those workloads at scale has required specialized tooling that, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/24/nvidia-kubernetes-gpu-driver-community/
-
The End of Static Security: Why AI Demands Real-Time Microsegmentation
AI is compressing cyberattack timelines from months to minutes. While segmentation has been a gold standard security practice for years, many organizations are still operating with outdated, static approaches. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/end-static-security-ai-demands-real-time-microsegmentation-i-5541
-
NSFOCUS Threat Intelligence: Building an OpenClaw Defense System with Multiple-Layer Protection
In 2026, AI agents are being widely used. OpenClaw has become a high-frequency efficiency improvement tool for enterprises and developers with its autonomous decision-making and local execution capabilities. However, several authoritative security agencies have recently issued warnings: OpenClaw is facing multi-dimensional security threats from supply chain poisoning to remote control. When internal employees privately deploy…The…
-
Achtung, Manipulation So missbrauchen Cyberkriminelle die KI
Tags: aiKünstliche Intelligenz ist längst nicht mehr nur ein Werkzeug zur Automatisierung und Effizienzsteigerung in Unternehmen. Die gleichen Technologien, die Geschäftsprozesse optimieren, werden zunehmend von Cyberkriminellen missbraucht. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/achtung-manipulation-so-missbrauchen-cyberkriminelle-die-ki
-
Autonomous AI adoption is on the rise, but it’s risky
Big risk, big reward: Herein lies the rub: AI experts see huge potential advantages with autonomous AI, with the possibility of creating huge workplace efficiencies, but the risks are substantial.Riley acknowledges both security concerns and the potential for agentic AI to take actions that users didn’t anticipate. While users haven’t yet seen autonomous AI able…
-
Gcore Radar report reveals 150% surge in DDoS attacks year-on-year
Luxembourg, Luxembourg, March 24th, 2026, CyberNewswire Gcore data highlights a threat landscape defined by newfound automated attack capabilities, scale, and frequency Gcore, the global infrastructure and software provider for AI, cloud, network, and security solutions, today announced the findings of its Q3-Q4 2025 Gcore Radar report DDoS attack trends. The report reveals growing attack volumes,…
-
Streamline physical security to enable data center growth in the era of AI
Tags: access, ai, automation, best-practice, business, control, data, framework, identity, risk, threat, tool, vulnerabilityThink beyond delivery : Every company operates as an economy of projects. But at AI scale, projects must evolve into programs. Designing and delivering AI-capable data centers requires an integrated, fast-moving production model built on repeatable processes and structured knowledge transfer. Intelligent reuse of project elements, including toolsets, intellectual property, templates, design standards and best practices, becomes…
-
GitHub just made it much harder to ship a vulnerable pull request
GitHub is expanding its application security capabilities with AI-powered security detections designed to identify risks earlier in the development process, with public … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/24/github-ai-powered-detections-code-scanning/
-
GitHub just made it much harder to ship a vulnerable pull request
GitHub is expanding its application security capabilities with AI-powered security detections designed to identify risks earlier in the development process, with public … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/24/github-ai-powered-detections-code-scanning/
-
KI in der Cybersecurity: Architektur schlägt Tools
KI entfaltet in der Cyber Security nur dann messbaren Mehrwert, wenn Architektur, Prozesse und Verantwortlichkeiten sauber definiert sind. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/ki-in-der-cybersecurity-architektur-schlaegt-tools/a44269/
-
Why CISOs should embrace AI honeypots
Tags: access, ai, api, attack, breach, business, ciso, credentials, cyberattack, cybercrime, cybersecurity, data, defense, detection, exploit, hacker, LLM, mitigation, open-source, RedTeam, risk, service, threat, tool, vulnerabilityWhy CISOs should consider honeypots: Another player in the AI honeypot space is Deutsche Telekom (DT). The firm is both a user and purveyor of AI-powered honeypots through its free, open-source platform ‘T-Pot.’ The most obvious advantage to their use, explains Marco Ochse, DT’s lead for threat analytics and mitigation, lies in how little these…
-
KI-Agenten im Einklang: Cycode stellt Maestro für Application Security vor
Gerade in einer Zeit, in der KI-generierter Code exponentiell zunimmt, könnte genau diese Art der Orchestrierung zum entscheidenden Faktor werden First seen on infopoint-security.de Jump to article: www.infopoint-security.de/ki-agenten-im-einklang-cycode-stellt-maestro-fuer-application-security-vor/a44265/
-
Wenn KI auf Kubernetes trifft: Sysdig feiert 10 Jahre Falco
Diese Jubiläumsankündigung zeigt vor allem eines: Open Source lebt von Engagement und von Unternehmen, die bereit sind, Verantwortung für die Technologien zu übernehmen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/wenn-ki-auf-kubernetes-trifft-sysdig-feiert-10-jahre-falco/a44262/
-
OWASP Top 10 Risks for Agentic Applications: Must-Know Risks
The rapid evolution of AI has moved us beyond simple chatbots into the era of agentic applications, systems that can plan, reason, and act autonomously across multiple steps. From finance and healthcare to cybersecurity and DevOps, these agents are no longer passive assistants; they are decision-makers. But with autonomy comes a new class of risks….…
-
QuikBot and EFGH bring real-time insurance to physical AI
The two companies will embed insurance directly into the infrastructure governing autonomous robots, reducing claims processing and creating a trust layer for smart cities First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366640577/QuikBot-and-EFGH-bring-real-time-insurance-to-physical-AI
-
Microsoft Unveils New GenAI Security Protections in Azure AI Foundry
Microsoft has outlined a new set of security safeguards designed to protect generative AI models hosted on Azure AI Foundry, as organizations increasingly adopt advanced AI systems into critical workflows. The move comes amid rapid growth in generative AI capabilities, where new models are released frequently, raising concerns about trust, data security, and supply chain…
-
AI Governance in 2026: Why Staying Current Is No Longer Optional for Your Business
AI Governance in 2026: Why Staying Current Is No Longer Optional for Your Business You deployed an AI tool to screen job applicants six months ago. Maybe you used ChatGPT to draft customer communications. Perhaps your product team quietly integrated a third-party AI into your SaaS platform. Each of these decisions, made quickly, in the…The…
-
AI agent discovery: Inventory and govern shadow AI agents – Nudge Security
Discover AI agents your employees build. Get complete inventory, risk insights, and governance across enterprise platforms with Nudge Security. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/ai-agent-discovery-inventory-and-govern-shadow-ai-agents-nudge-security/
-
Data Readiness: Fehlender Datenzugriff bremst datengestützte Initiativen aus
Zwei Drittel nennen Infrastruktur-Performanceprobleme als häufiges Hindernis. Die Hälfte nennen KI als Hauptgrund für neue Governance-Aktivitäten. Verzögerter Datenzugriff und geringe Datenqualität schmälern ROI. 90,4 Prozent der deutschen IT-Entscheider können nicht auf alle Daten zugreifen, die sie für ihre datengestützten Initiativen benötigen mit direkten Folgen für datenbasierte Projekte, KI und Kapitalrendite. Obwohl deutsche Unternehmen… First…
-
Unternehmen setzen verstärkt auf GenAI doch Sicherheitsgrundlagen fehlen
Tags: aiRobuste Sicherheitsgrundlagen sind der Schlüssel zur Skalierung von Enterprise AI. Zwar setzen mehr als die Hälfte der Unternehmen generative KI bereits ein, Sicherheits”‘ und Governance”‘Strukturen hinken jedoch deutlich hinter und bremsen damit die Skalierung von Enterprise”‘KI. Nur ein Fünftel der befragten Organisationen erreicht einen hohen KI”‘Reifegrad, während fehlende Datenschutzrichtlinien, unzureichende risikobasierte Steuerung und Probleme… First…
-
M-Trends Report 2026: Die aktuelle Bedrohungslage
Angreifer weiten mit Hilfe von KI ihre Aktivitäten aus, Angriffe sind jedoch weiterhin vor allem durch menschliche, prozessuale und technische Schwächen erfolgreich, wobei Vishing stark zunimmt und die Technologiebranche 2025 am häufigsten betroffen war. Gleichzeitig verkürzen arbeitsteilige Angreifermodelle und gezielte Angriffe auf Backups und Identitäten die Reaktionszeit drastisch, während die Verweildauer der Angreifer steigt und……
-
M-Trends Report 2026: Die aktuelle Bedrohungslage
Angreifer weiten mit Hilfe von KI ihre Aktivitäten aus, Angriffe sind jedoch weiterhin vor allem durch menschliche, prozessuale und technische Schwächen erfolgreich, wobei Vishing stark zunimmt und die Technologiebranche 2025 am häufigsten betroffen war. Gleichzeitig verkürzen arbeitsteilige Angreifermodelle und gezielte Angriffe auf Backups und Identitäten die Reaktionszeit drastisch, während die Verweildauer der Angreifer steigt und……
-
AI poised to most help low-skilled hackers in the near term
The expected rise in automated cyberattacks means more work for defenders —;but they can use AI to fight back. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/ai-cybercrime-ransomware-low-skilled-boost/815498/
-
Palo Alto updates security platform to discover AI agents
Next Generation Trust Security: Separately, Palo Alto Networks also announced a new digital certificate lifecycle management platform, following the closing last month of its acquisition of CyberArk.By integrating CyberArk’s machine identity intelligence into the network, NGTS closes the gap between the teams managing certificates and the teams responsible for uptime, Palo Alto Networks said in…
-
Palo Alto updates security platform to discover AI agents
Next Generation Trust Security: Separately, Palo Alto Networks also announced a new digital certificate lifecycle management platform, following the closing last month of its acquisition of CyberArk.By integrating CyberArk’s machine identity intelligence into the network, NGTS closes the gap between the teams managing certificates and the teams responsible for uptime, Palo Alto Networks said in…
-
Palo Alto updates security platform to discover AI agents
Next Generation Trust Security: Separately, Palo Alto Networks also announced a new digital certificate lifecycle management platform, following the closing last month of its acquisition of CyberArk.By integrating CyberArk’s machine identity intelligence into the network, NGTS closes the gap between the teams managing certificates and the teams responsible for uptime, Palo Alto Networks said in…
-
Palo Alto updates security platform to discover AI agents
Next Generation Trust Security: Separately, Palo Alto Networks also announced a new digital certificate lifecycle management platform, following the closing last month of its acquisition of CyberArk.By integrating CyberArk’s machine identity intelligence into the network, NGTS closes the gap between the teams managing certificates and the teams responsible for uptime, Palo Alto Networks said in…
-
AI Redefines Trust in Global Payments
Visa CISO Subra Kumaraswamy on Securing Agents, Fighting Fraud, Protecting Commerce. AI is transforming trust in global payments as attackers scale faster and agents automate decisions. CISO Subra Kumaraswamy explains how Visa uses AI to combat fraud, secure transactions and build trust across consumers, merchants and a rapidly evolving digital ecosystem. First seen on govinfosecurity.com…
-
Ransomware’s New Era: Moving at AI Speed
Threat actors bypass security tools and use AI to launch faster ransomware attacks that exploit valid credentials and target data First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/ransomware-new-era-moving-ai-speed

