Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Actors Are Increasingly Abusing AI Tools to Help With Scams

Cybercriminals are increasingly using AI tools to assist in malicious activities, according to Microsoft’s latest Cyber Signals report. “AI has started to lower the technical bar for fraud and cybercrime actors looking for their own productivity tools, making it easier and cheaper to generate believable content for cyberattacks at an increasingly rapid rate,” the report says.

Broken Cyber Windows Theory

Have you ever walked down a street with broken windows, burnt out cars, graffiti and felt a bit uneasy? There's a reason for that, and it's not just about aesthetics. The Broken Windows Theory, introduced by social scientists James Q. Wilson and George L. Kelling in 1982, suggests that visible signs of crime and antisocial behavior encourage further crime and disorder. But what does this have to do with cybersecurity? More than you might think.

Torq HyperSOC is the first Autonomous SOC Platform with Native Model-Context Protocol (MCP) Support

Innovation in cybersecurity technology, particularly in security operations, is advancing at an incredible pace. The past few months have seen a surge in announcements of Agentic AI solutions and SOC Analyst AI Agents, transforming the landscape rapidly. At BlackHat USA 2023, Torq pioneered this space by introducing Socrates, the first AI Agent SOC Analyst. This highlights the remarkable acceleration of AI adoption in cybersecurity and the significant advancements made in a relatively short period.

The Rise of Insider Threats

Imagine a scenario where an employee receives an email from a colleague, asking for login credentials to a valuable application within their organization. The recipient, perhaps busy with other tasks or not fully paying attention, quickly replies with the needed credentials. However, the sender was not actually a colleague, but a threat actor posing as a colleague. As a result, the now-compromised credentials enable the threat actor to launch a subsequent attack on the organization.

WatchGuard Signs The Climate Pledge, Commits to Net Zero by 2040

As a cybersecurity company, we spend every day thinking about how to protect the world from threats. As a global organization, WatchGuard has the power ‒ and the responsibility ‒ to step up and help fight the threat of unchecked climate change. That’s why we have signed The Climate Pledge and are deepening our commitment to environmental sustainability.

How the Right ESP Can Cut Costs, Reduce Risk & Get You CMMC Audit-Ready Faster

Navigating the Cybersecurity Maturity Model Certification (CMMC) framework can feel overwhelming, especially for government contractors working to secure and retain Department of Defense (DoD) contracts. Between implementing the 110 rigorous security requirements in NIST 800-171 and maintaining ongoing compliance, the path forward can feel like a maze of complexity and cost. But there’s a smarter way through it.

How Seemplicity Builds Integrations at Lightning Speed

When it comes to exposure management, actionable context is key. Security teams don’t just need data – they need the right insights, in the right place, at the right time to drive remediation activities. That’s why seamless integrations between security and workflow tools are essential. At Seemplicity, building these integrations quickly and effectively isn’t just a goal, it’s a core competency.

Snyk Ushers in the Future of DAST: AI-Driven Security for the Age of AI-Driven Development

I'm thrilled to announce Snyk API & Web, our next-generation dynamic application security testing (DAST) solution. It's more than just a product launch; it's Snyk’s answer to securing the complex, AI-powered applications developers are building today, deepening the integration of DAST into our comprehensive Developer Security Platform.