Tag: defense
-
TDL 016 – Speed, Risk, and Responsibility in the Age of AI – Rafael Ramirez
Tags: access, ai, antivirus, automation, awareness, business, ciso, cloud, control, country, cyber, data, defense, detection, dns, firewall, governance, government, hacker, ibm, incident response, intelligence, Internet, law, linkedin, login, mfa, microsoft, network, risk, saas, service, skills, software, startup, strategy, technology, threat, tool, training, update, vulnerability, windows, zero-trustSummary In a recent episode of The Defenders Log, host David Redekop sat down with cyber security expert Rafael Ramirez to navigate the rapidly shifting landscape of AI security. As we move deeper into 2026, the duo explored how artificial intelligence has evolved from simple chatbots into powerful, autonomous “agentic” systems. The Double-Edged Sword of…
-
Dynamic Objects in Active Directory: The Stealthy Threat
Active Directory’s “dynamic objects” feature offers attackers a perfect evasion cloak. These objects automatically self-destruct without a trace, so they allow adversaries to bypass quotas, pollute access lists, and persist in the cloud, leaving forensic investigators with nothing to analyze. Key takeaways The threat: Dynamic objects self-delete without leaving any traces, or “tombstones” in AD…
-
Turning Security Alerts into Actionable Defense
In today’s threat landscape, cyberattacks are no longer isolated incidents they are continuous, automated, and increasingly sophisticated. Organizations must move beyond traditional monitoring and adopt intelligent, real-time detection platforms capable of identifying both known and emerging threats. Seceon’s aiSIEM platform exemplifies this next-generation approach by delivering contextualized, behavior-driven security intelligence. The following real-world attack First…
-
Agentic AI in Cybersecurity is a Smarter, Faster Path to Resilience
Agentic AI is transforming cybersecurity by enabling autonomous threat detection, real-time response, and proactive defense across modern infrastructure. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/agentic-ai-in-cybersecurity-is-a-smarter-faster-path-to-resilience/
-
AI-Empowered Cybersecurity: Key Events and Emerging Trends in 2025
In September 2025, Anthropic disclosed a groundbreaking incident”, the world’s first autonomous AI-driven cyberattack. This event, documented as the first large-scale cyber offensive primarily executed by AI with minimal human intervention, underscored the immense threat posed by AI agents in malicious applications. The attackers posed as representatives of a legitimate cybersecurity firm conducting a defense assessment.…
-
Your Most Dangerous User Is Not Human: How AI Agents and MCP Servers Broke the Internal API Walled Garden
Highlights The Perimeter is Porous: Modern Agentic AI and the Model Context Protocol (MCP) have effectively turned internal data centers inside out, making the “internal API” security model obsolete. The “Confused Deputy” Risk: Legitimate AI agents act as trusted internal entities but can be exploited to bypass Data Loss Prevention (DLP) policies, as seen in…
-
Cogent Security Gets $42M to Boost AI Vulnerability Defense
Series A Led by Bain Capital Ventures Targets Autonomous Remediation Platform. Cogent Security secured $42 million in Series A funding to expand its AI-powered platform. Backed by Bain Capital Ventures, the company plans to triple staff, enhance model accuracy and scale its agent-based architecture to help enterprises automate remediation and counter AI-driven cyberattacks. First seen…
-
ONCD official says Trump administration aims to bolster AI use for defense without increasing risk
Alexandra Seymour also talked about cyber workforce goals, including emulating Israel’s Unit 8200. First seen on cyberscoop.com Jump to article: cyberscoop.com/trump-administration-ai-cybersecurity-oncd-strategy/
-
Findings From The Tidal Cyber 2025 Threat-Led Defense Report
<div cla The Tidal Cyber 2025 Threat-Led Defense Report represents a groundbreaking shift in cybersecurity analysis by placing real adversary behavior at the forefront of defense strategies. Read the Full Report, or an overview of our findings below. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/findings-from-the-tidal-cyber-2025-threat-led-defense-report/
-
NDSS 2025 Defending Against Backdoor Attacks On Graph Neural Networks Via Discrepancy Learning
Tags: attack, backdoor, conference, defense, framework, Internet, ml, network, risk, technology, threat, vulnerabilitySession 12D: ML Backdoors Authors, Creators & Presenters: Hao Yu (National University of Defense Technology), Chuan Ma (Chongqing University), Xinhang Wan (National University of Defense Technology), Jun Wang (National University of Defense Technology), Tao Xiang (Chongqing University), Meng Shen (Beijing Institute of Technology, Beijing, China), Xinwang Liu (National University of Defense Technology) PAPER DShield: Defending…
-
Hackers Hide Malware in Emoji-Based Code to Bypass Security Defenses
Hackers are increasingly abusing emoji and other Unicode tricks to hide malicious code, bypass filters, and evade modern security controls, including AI-powered defenses. This emerging technique, known as emoji or Unicode smuggling, turns harmless-looking characters into stealth carriers for commands, data, and exploit payloads. Emoji smuggling is an obfuscation technique in which attackers encode malicious content using…
-
Hackers Hide Malware in Emoji-Based Code to Bypass Security Defenses
Hackers are increasingly abusing emoji and other Unicode tricks to hide malicious code, bypass filters, and evade modern security controls, including AI-powered defenses. This emerging technique, known as emoji or Unicode smuggling, turns harmless-looking characters into stealth carriers for commands, data, and exploit payloads. Emoji smuggling is an obfuscation technique in which attackers encode malicious content using…
-
Koi Purchase Bolsters Palo Alto’s AI Attack Surface Defense
$300M Acquisition Strengthens Palo Alto Networks’ XDR and AI Governance Platform. Palo Alto Networks plans to acquire Koi Security for $300 million to address growing AI-driven endpoint risks. The startup’s technology adds deep visibility into AI agents plug-ins and nonbinary code, enhancing Cortex XDR and Prisma AIRS as enterprises confront a growing unmanaged AI attack…
-
Why are cybersecurity professionals confident in Agentic AI defenses?
How Are Non-Human Identities Reshaping Cloud Security Strategies? In what ways do organizations manage evolving digital machine identities? The rapid increase in machine-to-machine communications has brought about a new dimension of security considerations, particularly with the rise of Non-Human Identities (NHIs). NHIs, primarily composed of secrets like encrypted passwords, tokens, or keys, demand a strategic……
-
Why I Chose to Join AttackIQ as a Senior Advisor
After 30 years in cyber defense and research, I joined AttackIQ to bring clarity and prioritize what truly matters in security. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/why-i-chose-to-join-attackiq-as-a-senior-advisor/
-
EdTech Magazine – What Minimum Viable Cybersecurity Looks Like for K12 Districts
This article was originally published in EdTech Magazine on 02/11/26 by Didi Gluck. As ransomware and phishing attacks grow more sophisticated, districts can’t rely on perimeter defenses alone. Cybersecurity has become a top priority for K12 districts, not just to keep students safe online but to ensure continuity across devices, systems and end user accounts.…
-
You can jailbreak an F-35 just like an iPhone, says Dutch defense chief
No worries if the US doesn’t want to be friends with Europe anymore First seen on theregister.com Jump to article: www.theregister.com/2026/02/18/jailbreak_an_f35/
-
From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses
The shadow technology problem is getting worse. Over the past few years, organizations have scaled microservices, cloud-native apps, and partner integrations faster than corporate governance models could keep up, resulting in undocumented or shadow APIs. We’re now seeing this pattern all over again with AI systems. And, even worse, AI introduces non-deterministic behavior, autonomous actions,…
-
The defense industrial base is a prime target for cyber disruption
Cyber threats against the defense industrial base (DIB) are intensifying, with adversaries shifting from traditional espionage toward operations designed to disrupt production … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/18/luke-mcnamara-google-dib-defense-industrial-base-cybersecurity/
-
GitGuardian Doubles Down on AI Agent Defense With $50M Raise
Series C Funding Round Focuses on Secrets Remediation, Agent Governance Expansion. Backed by a $50 million Series C, GitGuardian plans to accelerate U.S. expansion and enhance secrets detection remediation and non-human identity controls as AI agents multiply across enterprises, increasing exposure to credential abuse and lateral movement. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/gitguardian-doubles-down-on-ai-agent-defense-50m-raise-a-30778
-
Cyber attacks enabled by basic failings, Palo Alto analysis finds
Changing the paradigm: Unit 42’s answer to this endless cycle of attackers always being one step ahead of defenders is to change the paradigm: cybersecurity has become so specialized, it says, that the answer is to use a managed service built from the ground up to counter real rather than abstract threats.With that in mind,…
-
ClickFix Attacks Abuses DNS Lookup Command to Deliver ModeloRAT
ClickFix campaigns have adapted to the latest defenses with a new technique to trick users into infecting their own machines with malware. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/clickfix-attacks-dns-lookup-command-modelorat
-
NDSS 2025 Defending Against Membership Inference Attacks On Iteratively Pruned Deep Neural Network
Session 12C: Membership Inference Authors, Creators & Presenters: Jing Shang (Beijing Jiaotong University), Jian Wang (Beijing Jiaotong University), Kailun Wang (Beijing Jiaotong University), Jiqiang Liu (Beijing Jiaotong University), Nan Jiang (Beijing University of Technology), Md Armanuzzaman (Northeastern University), Ziming Zhao (Northeastern University) PAPER Defending Against Membership Inference Attacks on Iteratively Pruned Deep Neural Networks Model…
-
Side-Channel Attacks Against LLMs
Tags: access, attack, chatgpt, credit-card, data, defense, exploit, LLM, monitoring, network, open-source, openai, phone, side-channelHere are three papers describing different side-channel attacks against LLMs. “Remote Timing Attacks on Efficient Language Model Inference”: Abstract: Scaling up language models has significantly increased their capabilities. But larger models are slower models, and so there is now an extensive body of work (e.g., speculative sampling or parallel decoding) that improves the (average case)…
-
NDSS 2025 SiGuard: Guarding Secure Inference With Post Data Privacy
Session 12C: Membership Inference Authors, Creators & Presenters: Xinqian Wang (RMIT University), Xiaoning Liu (RMIT University), Shangqi Lai (CSIRO Data61), Xun Yi (RMIT University), Xingliang Yuan (University of Melbourne) PAPER SIGuard: Guarding Secure Inference with Post Data Privacy Secure inference is designed to enable encrypted machine learning model prediction over encrypted data. It will ease…

