Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI for India, built on trust: what the new AI governance guidelines mean for the future

India has taken a decisive step toward shaping a responsible and inclusive AI future. The Government of India’s AI Governance Guidelines (2025) mark a bold framework that balances innovation, accountability, and trust—three pillars critical for sustainable AI growth. At a time when the world is debating the risks and rewards of artificial intelligence, India’s approach stands out for its clarity and cultural grounding.

AWS & 1Password: Securing the agentic future: AI, trust, and what comes next

1Password CEO, David Faugno, and AWS Vice President of Americas Channels and Alliances, Christopher Sullivan, sit down to reflect on how organizations can harness the potential of AI without compromising trust, security, and real-world business needs. Learn how AWS and 1Password are collaborating to help global enterprises move fast, stay secure, and build for what’s next -- Visit 1Password in the Amazon Web Services Marketplace: 1Password.com/AWSMarketplace.

Replicate is joining Cloudflare

We have some big news to share today: Replicate, the leading platform for running AI models, is joining Cloudflare. We first started talking to Replicate because we shared a lot in common beyond just a passion for bright color palettes. Our mission for Cloudflare’s Workers developer platform has been to make building and deploying full-stack applications as easy as possible. Meanwhile, Replicate has been on a similar mission to make deploying AI models as easy as writing a single line of code.

The researcher's desk: FortiWeb Authentication Bypass (CVE-2025-64446)

Welcome to The researcher’s desk – a content series where the Detectify security research team conducts a technical autopsy on vulnerabilities that are particularly interesting, complex, or persistent. For this issue, we look at CVE-2025-64446, a critical authentication bypass that has been actively exploited in the wild, targeting Fortinet’s Web Application Firewall (WAF) product, FortiWeb.

Intel Chat: LLM in malware, LandFall, Windows kernel zero-day & Ex-L3Harris exec sells secrets [268]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

The best security questionnaire automation software for 2025

Security questionnaires are now a standard part of doing business. Whether you’re closing enterprise deals or expanding into regulated markets, every buyer expects proof of your security posture—often in the form of long, repetitive questionnaires. The challenge isn’t finding the answers; it’s answering fast and consistently across formats, languages, and requirements. ‍ That’s where security questionnaire automation software comes in.

Email Bombing Followed by Teams IT Impersonation Attacks Continue

BlueVoyant’s Threat Fusion Cell and SOC have been tracking a significant and persistent social engineering campaign that cleverly exploits trusted communication channels to gain initial access to target networks. Since at least mid-October 2025, BlueVoyant has observed a consistent playbook where threat actors employ inbox sabotage as a pretext for highly convincing IT support impersonation over Microsoft Teams.

Endpoint Protection Blindspot: The Rise of Ransomware in the VM Layer

Learn about the shift from physical to virtual data centers in the 2000s and the rise of ransomware attacks that take advantage of security blind spots (e.g. lack of endpoint protection) to target hypervisors and breach your data. Learn why you need to shift from prevention only to cyber resilience for stronger defenses against modern adversaries (Scattered Spider, UNC5112, and others). Rubrik can help.

Invisible Instructions: Multimodal AI is Already Being Tricked

Invisible Instructions: Multimodal AI is Already Being Tricked In this clip from "Securing AI Part 4: The Rising Threat of Hidden Attacks in Multimodal AI," Diptanshu Purwar and Madhav Aggarwal respond to Jamison Utter's example of a new, well-known form of multimodal attack: abusing AI resume screeners by exploiting both text and visual processing. The Resume Attack: White-on-White Text.