Tag: automation
-
Integrate Gemini CLI into Your Kali Terminal to Speed Up Pentesting Tasks
With the release of Kali Linux 2025.3, penetration testers and security professionals gain access to an innovative AI-powered assistant, the Gemini Command-Line Interface (CLI). This open-source package brings Google’s Gemini AI directly into the terminal, offering natural languagedriven automation for common pentesting workflows. The integration of Gemini CLI marks a significant leap forward in the…
-
WhatsApp Exploited to Spread SORVEPOTEL Malware on Windows Systems
An aggressive malware campaign dubbed SORVEPOTEL is exploiting WhatsApp messages to infiltrate Windows systems, with its epicenter in Brazil. Rather than pursuing data theft or ransomware extortion, this self-propagating malware is engineered for rapid spread, leveraging social trust and automation to reach new victims. Trend Research telemetry shows that 457 of the 477 detected infections…
-
From Chatbots to Agents: The Evolution Toward Agentic AI
8 min readAgentic AI is emerging, shifting from passive chatbots to systems that reason, adapt, and autonomously execute multi-step tasks. Unlike “read-only” AI, agentic AI is “read-write,” able to modify data and trigger actions. This active AI offers automation opportunities but necessitates new security for non-human identities. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/from-chatbots-to-agents-the-evolution-toward-agentic-ai/
-
From Chatbots to Agents: The Evolution Toward Agentic AI
8 min readAgentic AI is emerging, shifting from passive chatbots to systems that reason, adapt, and autonomously execute multi-step tasks. Unlike “read-only” AI, agentic AI is “read-write,” able to modify data and trigger actions. This active AI offers automation opportunities but necessitates new security for non-human identities. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/from-chatbots-to-agents-the-evolution-toward-agentic-ai/
-
The Web’s Bot Problem Isn’t Getting Better: Insights From the 2025 Global Bot Security Report
Over 60% of websites remain unprotected against basic bots in 2025. Explore key findings from DataDome’s Global Bot Security Report to see how LLM crawlers and sophisticated automation are reshaping online threat landscapes and what businesses can do to defend themselves. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/the-webs-bot-problem-isnt-getting-better-insights-from-the-2025-global-bot-security-report/
-
The Security Maginot Line: Fighting Tomorrow’s Cyber Attacks With Yesterday’s Tech
Alan warns that cybersecurity is stuck in a “Maginot Line” mindset, clinging to outdated tools while attackers weaponize AI, supply chain compromises, and polymorphic malware. He argues for AI-native defenses, real agentic automation, and stronger supply chain vetting to keep pace with modern threats. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/the-security-maginot-line-fighting-tomorrows-cyber-attacks-with-yesterdays-tech/
-
Agentic AI in IT security: Where expectations meet reality
Tags: ai, api, automation, cloud, compliance, control, credentials, crowdstrike, cybersecurity, data, detection, finance, framework, gartner, google, governance, infrastructure, injection, metric, phishing, RedTeam, risk, service, siem, skills, soar, soc, software, strategy, technology, threat, tool, trainingIntegration approaches: Add-on vs. standalone: The first decision regarding AI agents is whether to layer them onto existing platforms or to implement standalone frameworks. The add-on model treats agents as extensions to security information and event management (SIEM), security orchestration, automation and response (SOAR), or other security tools, providing quick wins with minimal disruption. Standalone…
-
Agentic AI in IT security: Where expectations meet reality
Tags: ai, api, automation, cloud, compliance, control, credentials, crowdstrike, cybersecurity, data, detection, finance, framework, gartner, google, governance, infrastructure, injection, metric, phishing, RedTeam, risk, service, siem, skills, soar, soc, software, strategy, technology, threat, tool, trainingIntegration approaches: Add-on vs. standalone: The first decision regarding AI agents is whether to layer them onto existing platforms or to implement standalone frameworks. The add-on model treats agents as extensions to security information and event management (SIEM), security orchestration, automation and response (SOAR), or other security tools, providing quick wins with minimal disruption. Standalone…
-
Top 10 Best AI Penetration Testing Companies in 2025
Tags: ai, automation, cyber, cybersecurity, intelligence, penetration-testing, strategy, threat, tool, vulnerabilityIn 2025, AI penetration testing tools have become the backbone of modern cybersecurity strategies, offering automation, intelligence-driven reconnaissance, and vulnerability analysis faster than traditional manual assessments. Businesses now demand AI-powered solutions to protect against evolving cyber threats and ensure compliance. Choosing the right AI penetration testing platform not only saves time and resources but also…
-
Keeper Security Integration with Google SecOps Expands Visibility into Privileged Access
Keeper Security has announced a new integration with Google Security Operations (GoogleSecOps). The integration streams privileged access activity from Keeper into the Google SecOps platform, which unifies Security Information and Event Management (SIEM), Security Orchestration, Automation and Response (SOAR) and threat intelligence, to give security teams real-time visibility and faster incident response. As attackers increasingly…
-
Industrial Automation Threats Decline Slightly in Q2 2025, but Risks Remain
ICS malware infections fell in Q2 2025, but phishing and evolving threats keep OT environments at risk. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/industrial-automation-threats-decline-slightly-in-q2-2025-but-risks-remain/
-
Anton’s Security Blog Quarterly Q3 2025
Tags: ai, automation, breach, ciso, cloud, cyber, defense, detection, edr, google, governance, guide, metric, office, RedTeam, risk, siem, soc, software, supply-chain, threat, vulnerability, vulnerability-management, zero-trustAmazingly, Medium has fixed the stats so my blog / podcast quarterly is back to life. As before, this covers both Anton on Security and my posts from Google Cloud blog, Google Cloud community blog, and our Cloud Security Podcast (subscribe on Spotify). Gemini for docs based on this blog Top 10 posts with the most…
-
CS4CA: OT Security Strategies for Critical Infrastructure
Speaker for Upcoming CS4CA Europe London Event Discusses OT Risk and Collaboration. IT and OT teams at critical infrastructure companies face the imperative of balancing digitalization and automation with cybersecurity. In advance of the CS4CA Europe London Conference (Sept. 30 – Oct. 1, 2025), event speaker Marta Majtenyi previews some of the major themes. First…
-
Closing the Visibility Gap: Corporate Exposure Analytics in the Infostealer Era
Co-authored by Constella Intelligence and Kineviz As infostealer malware continues to scale in reach, automation, and precision, organizations face an increasingly urgent challenge: a lack of comprehensive visibility across their identity exposure landscape. While credential leaks and cookie thefts are often detected in isolation, without centralized and time-aware analytics, security teams cannot understand the true extent……
-
Harness takes aim at AI ‘bottleneck’ with DevSecOps agents
The vendor’s new agentic features are included in products that already have a track record in AI-driven automation, as coding agents swamp software delivery pipelines. First seen on techtarget.com Jump to article: www.techtarget.com/searchitoperations/news/366631493/Harness-takes-aim-at-AI-bottleneck-with-DevSecOps-agents
-
Harness takes aim at AI ‘bottleneck’ with DevSecOps agents
The vendor’s new agentic features are included in products that already have a track record in AI-driven automation, as coding agents swamp software delivery pipelines. First seen on techtarget.com Jump to article: www.techtarget.com/searchitoperations/news/366631493/Harness-takes-aim-at-AI-bottleneck-with-DevSecOps-agents
-
CSO Awards winners highlight security innovation and transformation
Tags: ai, attack, automation, awareness, best-practice, business, ciso, cloud, compliance, conference, control, cyber, cybersecurity, data, defense, detection, finance, flaw, framework, governance, group, guide, infrastructure, intelligence, login, malicious, metric, mitre, network, penetration-testing, phishing, privacy, programming, risk, risk-management, service, siem, skills, soc, software, technology, threat, tool, training, update, vulnerability, vulnerability-managementFSU tackles third-party risk with tighter vendor management program: Organization: Florida State UniversityProject: Third-Party Risk Management ProgramSecurity leader: Bill Hunkapiller, CISOOfficials at Florida State University wanted to ensure that data shared with outside entities was well protected. To achieve that, CISO Bill Hunkapiller and his team revamped its third-party risk management program so that the…
-
The Messy Middle: Where SOC Automation Breaks (and How Morpheus AI Fixes It)
SOC automation breaks in the messy middle of triage and investigation. Learn how Morpheus AI fixes it with transparent, adaptive playbooks. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/the-messy-middle-where-soc-automation-breaks-and-how-morpheus-ai-fixes-it/
-
Operationalizing NIST and MITRE with Autonomous SecOps
How Morpheus brings trusted cybersecurity frameworks to life through automation and intelligence. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/operationalizing-nist-and-mitre-with-autonomous-secops/
-
Top 10 Best Security Orchestration, Automation, And Response (SOAR) Tools in 2025
Security Orchestration, Automation, and Response (SOAR) tools are revolutionizing how organizations defend against evolving threats, streamline security workflows, and automate incident response. In an era of complex attack surfaces and alert fatigue, SOAR solutions empower security teams to respond faster, reduce manual workloads, and maintain compliance across hybrid environments. This comprehensive guide reviews the top…
-
Where CISOs need to see Splunk go next
Tags: ai, api, automation, cisco, ciso, cloud, communications, compliance, conference, crowdstrike, cybersecurity, data, data-breach, detection, finance, framework, google, incident response, intelligence, jobs, metric, microsoft, open-source, RedTeam, resilience, risk, router, siem, soar, strategy, tactics, threat, tool, vulnerabilityResilience resides at the confluence of security and observability: There was also a clear message around resilience, the ability to maintain availability and recover quickly from any IT or security event.From a Cisco/Splunk perspective, this means a more tightly coupled relationship between security and observability.I’m reminded of a chat I had with the chief risk…
-
Check Point acquires Lakera to build a unified AI security stack
Tags: access, ai, api, attack, automation, cloud, compliance, control, cybersecurity, data, endpoint, government, infrastructure, injection, LLM, network, RedTeam, risk, saas, startup, supply-chain, tool, trainingClosing a critical gap: Experts call this acquisition significant and not merely adding just another tool to the stack. “This acquisition closes a real gap by adding AI-native runtime guardrails and continuous red teaming into Check Point’s stack,” said Amit Jaju, senior managing director at Ankura Consulting. “Customers can now secure LLMs and agents alongside…
-
5 steps for deploying agentic AI red teaming
Tags: access, ai, application-security, attack, automation, blizzard, business, cloud, control, data, defense, exploit, framework, gartner, governance, infrastructure, malicious, open-source, RedTeam, risk, risk-assessment, service, software, threat, tool, zero-trustFive steps to take towards implementing agentic red teaming: 1. Change your attitude Perhaps the biggest challenge for agentic red teaming is adjusting your perspective in how to defend your enterprise. “The days where database admins had full access to all data are over,” says Suer. “We need to have a fresh attitude towards data…
-
From prevention to rapid response: The new era of CISO strategy
Tags: access, attack, authentication, automation, awareness, breach, ciso, control, credentials, cybersecurity, data, finance, fintech, infrastructure, Intruder, malicious, monitoring, network, privacy, radius, resilience, service, strategy, threat, zero-trustBreaches will happen, so how do we deal with the fallout?CISOs are now spending less energy trying to keep every threat at bay. They know attackers will get in, but the question is, what’s next? The new mindset is about stopping intruders from moving around and escalating the damage.This shift means investing in sharper visibility,…
-
SecurityScorecard Buys AI Automation Capabilities, Boosts Vendor Risk Management
The company acquired HyperComply to help enterprises automate vendor security reviews and gain a real-time picture of the security of their entire supply chain. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/securityscorecard-buys-ai-automation-capabilities-boosts-vendor-risk-management
-
How AI-powered ZTNA will protect the hybrid future
Tags: access, ai, authentication, automation, business, ciso, cloud, compliance, control, data, healthcare, identity, infrastructure, skills, strategy, tool, vpn, zero-trustThe multi-cloud access management reality: The complexity I’m witnessing goes beyond traditional VPN sprawl challenges. Take a healthcare enterprise I worked with: patient management on AWS, legacy billing on-premises, analytics on Azure and disaster recovery in a third cloud. Each environment has different access controls, identity providers and security policies. A nurse accessing patient data…
-
How AI-powered ZTNA will protect the hybrid future
Tags: access, ai, authentication, automation, business, ciso, cloud, compliance, control, data, healthcare, identity, infrastructure, skills, strategy, tool, vpn, zero-trustThe multi-cloud access management reality: The complexity I’m witnessing goes beyond traditional VPN sprawl challenges. Take a healthcare enterprise I worked with: patient management on AWS, legacy billing on-premises, analytics on Azure and disaster recovery in a third cloud. Each environment has different access controls, identity providers and security policies. A nurse accessing patient data…
-
CISOs grapple with the realities of applying AI to security functions
Tags: ai, automation, breach, business, ceo, ciso, compliance, cybersecurity, data, detection, email, endpoint, finance, governance, incident response, intelligence, law, malicious, malware, microsoft, risk, service, soc, threat, toolThe agentic edge: The financial services is often an early adopter of cutting-edge security technologies.Erin Rogers, SVP and director of cybersecurity risk and compliance at BOK Financial, tells CSO that AI-based upgrades are helping threat detection and response systems to autonomously analyze threats, make real-time decisions, and adapt responses, significantly improving early detection and mitigation.While…
-
CISOs grapple with the realities of applying AI to security functions
Tags: ai, automation, breach, business, ceo, ciso, compliance, cybersecurity, data, detection, email, endpoint, finance, governance, incident response, intelligence, law, malicious, malware, microsoft, risk, service, soc, threat, toolThe agentic edge: The financial services is often an early adopter of cutting-edge security technologies.Erin Rogers, SVP and director of cybersecurity risk and compliance at BOK Financial, tells CSO that AI-based upgrades are helping threat detection and response systems to autonomously analyze threats, make real-time decisions, and adapt responses, significantly improving early detection and mitigation.While…

