Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Agent Security: Verifying Workflows with AI Firewalls & Guardrails

AI Agent Security: Verifying Workflows with AI Firewalls & Guardrails A10 security experts Jamison Utter, Madhav Aggarwal, and Diptanshu Purwar discuss the importance of context-aware security for AI agents. They emphasize that when automating workflows with AI, it's crucial to ensure that the context fed to the agents and their subsequent actions are verifiable and in line with existing company policies.

Attackers Use AI Development Tools to Craft Phony CAPTCHA Pages

Attackers are abusing AI-powered development platforms like Lovable, Netlify and Vercel to create and host captcha challenge websites as part of phishing campaigns, according to researchers at Trend Micro. “Since January, Trend Micro has observed a rise in fake captcha pages hosted on such platforms,” the researchers write.

New AI-Driven Phishing Platform Automates Attack Campaigns

Researchers at Varonis warn of a new phishing automation platform called “SpamGPT” that “combines the power of generative AI with a full suite of email campaign tools.” While previous phishing kits have automated parts of the attack chain, SpamGPT’s sophistication sets it apart from the rest “SpamGPT’s interface and features imitate a professional email marketing service, but for illegal purposes,” Varonis writes.

AI vs. Human: What SpamGPT Means for the Future of Security

Phishing is not new. But SpamGPT has changed the game by showing how AI can industrialize deception at scale. SpamGPT has quickly become the poster child for how attackers are using AI to industrialize old tricks. At its core, SpamGPT isn’t introducing a new kind of attack; it’s simply making phishing faster, cheaper, and more convincing. Phishing has always been about deception. But with AI generating endless, polished, and context-aware lures, the balance of power shifts.

Is AI really new-or just automation with better branding?

“AI is just automation by a different name.” It’s a bold claim—but one that Brandon Heller, CTO and co-founder of Forward Networks, and Howard Holton, CEO of GigaOm, unpack in a way that will make you think. In their recent conversation on Discovering Disruptions in Tech, they make the case that artificial intelligence, especially generative AI, is not delivering brand-new capabilities.

Still Using RBAC in AI? You're Already Behind.

Traditional role-based access control (RBAC) was built for structured systems - not for the messy, unstructured data that powers today’s AI workflows. In this video, we explore real-world healthcare scenarios where RBAC breaks down like mental health notes, lab results, and substance use histories buried in clinical documents. You’ll see how Protecto’s Context-Based Access Control (CBAC) solves this by understanding the user, prompt, and context - and enforcing policies in real time, without breaking AI functionality.

AI Meets SAST - Reimagining the Future of Static Analysis | Webinar Mend.io

Join host Tony Morbin as he explores how AI is revolutionizing Static Application Security Testing (SAST) in this future-forward episode with Saoirse Hinksmon, Senior Product Marketing Manager at Mend.io, and Amir Shahmir, Senior Sales Engineer at Mend.io. This isn’t your average security webinar — it’s a deep dive into the convergence of AI and SAST, uncovering how GenAI is making static analysis faster, smarter, and more actionable for developers and AppSec teams alike.

AI Is Writing the Code - Can Security Keep Up? | How to Secure Agentic IDEs from Dev to CI/CD | Mend

AI coding agents are exploding in use—but are they quietly shipping exploitable code? In this webinar, we break down real data, real incidents, and a practical blueprint for securing AI-accelerated development.

AI Data Privacy Trends and Future Outlook 2025

AI is now woven into everyday work. Customer teams rely on chat assistants, developers use copilots, and analysts ask models to sift through knowledge bases. The biggest shift in 2025 is not a single law or headline. It is the move from occasional audits to continuous, technical controls that run wherever data flows.

How agentic AI and non-human identities are transforming cybersecurity

Within the average enterprise, non-human identities (NHIs) now outnumber employees, contractors, and customers by anything between 10-to-1 and 92-to-1. Add to this the fragmentation of human identity management resulting from authorizing a single person’s access to multiple on-premises, cloud computing and hybrid environments, and enterprise identity and access management (IAM) becomes extremely challenging.