AI Agents: How Your New Employee Brings More Security Risks

AI agents aren’t applications. They’re employees. So why are we treating them like applications? AI agents don’t behave like classic applications. They access systems. They make decisions. They operate continuously. They interact with humans and other systems without being explicitly triggered each time. That’s not automation. That’s not scripts. That’s a digital worker.

Agentic AI Security: Onboard Multi-Cloud Environments with AI

LimaCharlie's Agentic SecOps Workspace (ASW) lets agentic AI security solutions operate directly inside your environment. Everything in LimaCharlie’s SecOps Cloud Platform connects via API. For us, AI isn't a bolt-on layer. It's woven into the same fabric as your detections, sensors, and integrations. Limacharlie’s approach makes it easy for users to bring-your-own-LLM into security operations.

Falcon Cloud Security Cloud Detection and Response (CDR)

Discover how CrowdStrike Falcon Cloud Security stops breaches with Cloud Detection & Response (CDR). Witness our Real-Time Cloud Detections in action as we identify and mitigate a sophisticated attack by LABYRINTH CHOLLIMA. Learn how our integrated threat intelligence and unified detection & response capabilities help SOC teams outpace modern cloud adversaries.

Cato CTRL Threat Research: When OpenClaw, Your AI Personal Assistant, Becomes the Backdoor

Cato CTRL’s Vitaly Simonovich (senior security researcher) has identified a threat actor selling root shell access to a UK-based automation company through a compromised AI personal assistant based on OpenClaw.

Microsoft Defender vs. MDR: What's Missing?

Microsoft Defender is widely deployed across small and midsize businesses. It is built into the Microsoft ecosystem, familiar to IT teams, and effective at detecting suspicious activity on endpoints. However, detection alone does not stop an attack. As cyber threats evolve, the biggest risk is not missing alerts. It’s failing to investigate and respond to them fast enough. The risk lies in what happens after an alert is generated.

How Conduent Lost 25 Million Records in 83 Days: The DLP Failure Everyone Missed

For 83 days, attackers moved freely through Conduent's systems and exfiltrated 8 terabytes of healthcare records, Social Security numbers, and personal data belonging to tens of millions of Americans. No alarm sounded. No transfer was blocked. The breach was discovered when systems stopped working. Not because anyone detected the data leaving.

From Security Theatre to Real Resilience: Why Most Incident Response Plans Fall Apart

Are you ready for the cybersecurity incident that could bring your business to a standstill? On this episode of Razorwire, I sit down with Marius Poskus, a CISO and vCISO, to tackle one of the most crucial yet overlooked aspects of information security: incident response. Whether you’re leading a cyber team, supporting your board, or simply keen to sharpen your readiness, we dig into what happens when your best defences fail and chaos strikes.

Ep. 47 - APT42 & Iran's AI Social Engineering: Deepfakes, Phishing & Hack-and-Leak

Iran’s APT42 — also known as Charming Kitten or Mint Sandstorm — is redefining social engineering with generative AI, deepfake voice cloning, and long-term phishing campaigns. In this episode of the Cyber Resilience Brief, we break down how Iranian state-sponsored threat actors are using AI-powered phishing, MFA fatigue attacks, credential harvesting, and hack-and-leak operations to target journalists, political campaigns, academics, and enterprise executives.

How Do CNAPP Platforms Help Prevent Misconfigurations Across Multi-Cloud Environments?

Cloud misconfigurations rank among the leading causes of cloud security incidents across AWS, Azure, and Google Cloud Platform. CNAPP platforms deliver cloud security posture management (CSPM) with continuous detecting misconfigurations in multi-cloud environments, automated remediation for cloud misconfiguration, and unified policy enforcement.