Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Proactively Identify and Eliminate Defensive Weaknesses with Cybersecurity Domain-Specific AI

AI is everywhere. I live in San Francisco, and a day doesn’t go by that I don’t see a billboard, an advertisement on the side of a bus, or a tech bro’s hoodie with two big letters on it: AI. It’s no different in cybersecurity marketing – AI terminology is everywhere. But too often, it’s tacked on as a buzzword – a thin layer washed on top of existing security tools, with little real impact. This makes it tricky to decipher what’s real and what’s hype.

Multimodal Attacks and Model Drift: The Future of AI Exploitation

Multimodal Attacks and Model Drift: The Future of AI Exploitation A10 security experts Jamison Utter, Diptanshu Purwar, and Madhav Aggarwal discuss the critical vulnerabilities emerging from multimodal AI agents (systems that perceive, decide, and act) and the absolute need for security mechanisms external to the Large Language Model (LLM) itself. The experts dive into why traditional security is failing and what the next evolution of defense must look like.

AI Watermark Remover & Image to Video AI: Powerful Tools for the Visual Age

The pace of digital content creation is faster than ever, and success depends on standing out. No matter your field-marketing, design, e-commerce, or education-the demand for clear, versatile, and engaging visuals is universal. Two advancements now empower creators to meet this demand: ai watermark remover and image to video ai. Here's how these tools can transform your content, boost productivity, and unlock fresh storytelling opportunities.

The Future of Firmware in Edge Computing and Embedded AI

Here's what's happening right now: intelligence is migrating closer to the action. Your smart devices? They're not sitting around waiting for some distant cloud server to tell them what to do anymore. They're making decisions on the spot, right where the work happens. This transformation is fundamentally altering how intelligent systems get built and deployed. Consider this: the global AI in embedded systems market is heading toward US$26.2 billion by 2026.

Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers

SquareX released critical research exposing a hidden API in Comet that allows extensions in the AI Browser to execute local commands and gain full control over users' devices. The research reveals that Comet has implemented a MCP API (chrome.perplexity.mcp.addStdioServer) that allows its embedded extensions to execute arbitrary local commands on users' devices, capabilities that traditional browsers explicitly prohibit. Concerningly, there is limited official documentation on the MCP API.

What Is a Large Language Model (LLM)?

The history of computing is marked by sea change moments; those times when the world seems to shift into a new possibility space almost overnight. ENIAC. The personal computer. The World Wide Web. The smartphone. And now, AI. While the term “AI” has been applied to many new (or re-branded) services and products, the underlying technology that makes most of them feel like magic is the large language model (LLM).

Cloudflare Firewall for AI Explainer and Demo

AI is powerful, but without protections in place, it’s risky. In this explainer and demo, you'll learn how you can secure your AI-powered applications with Cloudflare Firewall for AI. The demo will show Firewall for AI detecting and mitigating threats like PII exposure, unsafe/toxic content, prompt injection, and jailbreak. Further, you'll see Cloudflare’s powerful analytics capability and how Cloudflare's AI agent, Cloudy, can help investigate threats and build and deploy Firewall for AI security policies.

How KnowBe4 Uses AI Efficiently to Get the Best Results

Using the right tool for the job is always better. Anyone who does DIY projects around the home knows how using the right tool can dramatically make the job you are doing far easier. Use the wrong tool, and that task suddenly becomes a burdensome nightmare. And after over 38 years in cybersecurity, I know that applies to cyber defense strategies, but I add one more axiom: Use the dumber, faster thing first for best results. Dumber things are usually faster at blocking a large number of things.

How AI offers defenders even more growth opportunities with Michael Baker from DXC Technology [269]

On this episode of The Cybersecurity Defenders Podcast we speak with Michael Baker, VP, Global Chief Information Security Officer at DXC Technology, about his optimistic outlook on the impact of AI in cybersecurity.