Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Agentic AI Creates Shadow APIs: Security Risks Explained

How Agentic AI Creates Shadow APIs: Security Risks Explained As businesses move from static applications to Agentic AI, the security landscape is shifting beneath our feet. In this clip from the A10 Networks webinar, "APIs are the Language of AI: Protecting Them is Critical," experts Jamison Utter and Carlo Alpuerto discuss a new frontier in cybersecurity: AI that builds its own APIs.

Arctic Wolf and AWS: AI-Powered SOC and Security Incident Response

Discover how Arctic Wolf partners with Amazon Web Services (AWS) to deliver cutting-edge, AI-powered Security Operations Center (SOC) capabilities and advanced security incident response solutions. This video explores how Arctic Wolf leverages AWS cloud infrastructure and artificial intelligence to provide: Learn how this powerful combination enhances your organization's security posture, reduces response times, and protects against evolving cyber threats through intelligent automation and comprehensive managed detection and response (MDR) services.

Intel Chat: Ni8mare CVSS 10.0, malicious AI extensions, Venezuela blackout & BlackCat insiders [281]

A newly disclosed vulnerability in the workflow automation platform n8n, tracked as CVE-2026-21858 and rated CVSS 10.0, allows unauthenticated remote attackers to fully compromise exposed instances. Two malicious Chrome extensions impersonating a legitimate product from AITOPIA were found exfiltrating sensitive user data, including full AI chat histories, according to a report from OX Security. The recent U.S. military operation in Venezuela that led to the capture of President Nicolás Maduro may have included cyber operations, but official confirmation of cyber’s role remains ambiguous.

What We Got Right (and Wrong) about 2025

Watch now for a clear and candid look back at the predictions made for 2025 by Wallarm and by other voices across the industry. During the session, we revisit what people expected to happen in cybersecurity, API security, and the broader technology space, and compare those expectations with what actually unfolded throughout the year.

Start Where You Are: Resilience in Healthcare Begins With Action

In this episode of Building Cyber Resilience: A Healthcare Leader’s Guide, Josh Howell, Healthcare CTO at Rubrik, sits down with Heather Costa, Director of Technology Resilience at Mayo Clinic and Vice President at WiCyS Healthcare. Heather breaks down what it takes to build real resilience inside complex healthcare systems where downtime carries human consequences. She shares practical frameworks for prioritization, overcoming analysis paralysis, and aligning leadership around what matters when every minute counts.

Stop Ignoring This AI Bug! (Safety Security) #shorts

Are you confusing AI Safety with AI Security? In this clip, we break down why AI is a "Socio-Technical" system and why that matters for your code. We ask the expert: How do you handle "Safety Bugs" (like bias) versus traditional "Security Bugs" (like hacks)? The answer might save your next project. Subscribe for more AI Security insights! @protectoai.

Brivo Access: How to Set up the Bosch + Brivo Integration

The Bosch Intrusion Panel integration in Brivo Security Suite empowers customers to manage doors and alarms from a single platform, and automatically links security events to rapid responses. Learn how to set up the integration in this video. Explore the future of security and smart technology with Brivo. Our content delves into innovative solutions that empower businesses and individuals to create safer, more connected environments.

57% of Companies ALREADY BREACHED Through APIs (Your Company Is Probably Next) #apisecurity #api

82% of companies are going API-First in 2025 But here's the troubling fact: 57% of them have ALREADY been breached through APIs. Why? Because they're going API-first without a solid API security strategy. It's like buying a sports car and forgetting the insurance. Organizations are racing toward digital transformation while threat actors simply walk through the open door. Threat actors love when you're API-first without a good security program. It makes their job easier.