Security
Security
3 min read
While data at rest and in transit have established security controls like encryption and identity access management, AI’s 'data in use' state—when models perform inference or training—remains largely unprotected. This runtime phase is a newfound risk area, wh...
Security
Security
3 min read
Both Microsoft and Palo Alto Networks have applied frontier AI models to scan extensive product portfolios and internal code, resulting in the detection of dozens of vulnerabilities. These efforts highlight a growing trend of integrating AI-driven tools into...
Security
Security
3 min read
Recent analyses from Mandiant and Verizon show attackers can exploit vulnerabilities even before patches are fully applied and that remediation delays average over a month for critical edge flaws. However, speed alone does not guarantee risk reduction. Withou...
Security
Security
3 min read
The incident, attributed to the Nitrogen ransomware group, involved theft of approximately 8TB of files related to high-profile companies including Apple, Intel, and Nvidia. This event underlines the persistent threat ransomware poses to industrial environmen...
Security
Security
3 min read
Modern attack strategies leverage multiple small vulnerabilities, spanning from application code bugs to cloud misconfigurations, to create what experts call a 'Lethal Chain.' Traditional security tools focused on isolated layers generate alert noise that dis...
Security
Security
3 min read
This month’s Patch Tuesday featured a near-record number of fixed vulnerabilities across major platforms, underscoring AI's growing role in preemptively identifying security risks. Rapid patch deployment aims to reduce attack surfaces involving Windows system...
Security
Security
3 min read
Signal users have been targeted by sophisticated phishing campaigns leveraging the app's linked devices feature. Attackers impersonate trusted contacts or support teams to trick users into linking malicious devices or sharing verification codes. Signal’s new...
Security
Security
3 min read
The latest evolution in npm supply chain threats leverages an attacker-controlled injection into trusted CI/CD pipelines, producing software artifacts indistinguishable from legitimate builds at the provenance level. The threat actor, TeamPCP, employed multip...
Security
Security
3 min read
The YellowKey flaw enables bypassing BitLocker encryption by manipulating Windows Recovery Environment, allowing attackers unrestricted access to encrypted volumes without requiring user authentication. Complementing this, GreenPlasma is a local privilege esc...
Security
Security
3 min read
MDASH employs a complementary ensemble of specialized AI agents to analyze Windows source code, validate findings, and prove vulnerabilities, including critical remote code execution flaws. This marks a shift toward agentic AI systems as cornerstone defenses...