Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

5 AI Scams You Need To Be Aware Of In 2025

AI is revolutionizing our lives in terms of productivity, automation, customer service, and more. AI is becoming so important that organizations increased spending on compute and storage hardware infrastructure for AI deployments by 37% year-over-year in the first half of 2024, reaching $31.8 billion. However, like most technological advances, the good often comes with the bad.

How AI Can Crack Your Passwords

As AI becomes more advanced, it's important to consider all the ways AI can be used maliciously by cybercriminals, especially when it comes to cracking passwords. Cybercriminals can use AI to perform 3 different types of password-cracking attacks: acoustic side-channel, brute force and dictionary attacks. Learn more about these AI-powered password-cracking attacks.

Matching AI Strengths to Blue Team Needs

Much has been written about how AI, particularly Large Language Models (LLMs), will transform cybersecurity. Some say it'll be for the worse, and some say it'll be for the better. Although SURGe firmly believes that AI will end up helping defenders much more than it helps threat actors, it's sometimes hard to envision the exact form in which this help will, or should, come.

AI: The Cybersecurity Revolution or Apocalypse? Interview with Steve Wilson at DAVOS 2025

AI is reshaping both innovation and cybercrime, with attackers leveraging its power to outpace traditional defenses. As cybercrime costs surge, organizations must adopt strategies to bridge the cybersecurity skills gap and adopt AI to stay ahead.

Instant Insights for SOC 2 Reporting: Using AI to Streamline Vendor Assessments

With technology supply chain risks at an all-time high, many governance, risk, and compliance (GRC) teams conduct formal risk assessments as part of their new vendor selection and onboarding processes. Audit-based reporting frameworks like SOC 2 are invaluable to these efforts, as they provide a consistent way to benchmark prospective vendors’ customer data management practices.

How Protecto Safeguards Sensitive Data in AI Applications

Discover how to build secure, compliant, and privacy-preserving AI applications with Protecto. In this video, we explain how Protecto's simple APIs protect sensitive data, ensuring compliance with regulations like HIPAA. Learn how a healthcare company used Protecto to create an AI-based fraud detection application while safeguarding millions of patient health insurance claims. Protecto's API masks sensitive information, preserving context and meaning without exposing personal identifiers like names or social security numbers.

From Alerts to Action: How AI Empowers SOC Analysts to Make Better Decisions

Security Operations Center (SOC) analysts have it rough. Modern security tools generate an extraordinary number of alerts, attackers are more sophisticated than ever, and IT infrastructures are unprecedentedly complex. As a result, analysts are overwhelmed with workload and alerts, making it near-impossible to make intelligent, informed decisions. Fortunately, artificial intelligence (AI) is helping to ease the strain. Let’s look at how.

Navigating AI Agent Security Amid Evolving Regulations

The landscape of artificial intelligence (AI) governance is undergoing significant changes, particularly as it relates to the rise of AI Agents—autonomous systems that can independently make decisions and execute tasks. Recently, a key executive order on AI safety was rescinded, which previously required developers to share safety test results with federal agencies and mandated comprehensive assessments of AI-related risks.

AI Text Generator: Revolutionizing Content Creation

In the digital age, content creation has become a cornerstone of communication. Whether for business, education, or entertainment, the demand for fresh and engaging content is ever-growing. Enter AI text generators, a game-changing technology designed to simplify and revolutionize how we create text.