Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Attackers Use AI Development Tools to Craft Phony CAPTCHA Pages

Attackers are abusing AI-powered development platforms like Lovable, Netlify and Vercel to create and host captcha challenge websites as part of phishing campaigns, according to researchers at Trend Micro. “Since January, Trend Micro has observed a rise in fake captcha pages hosted on such platforms,” the researchers write.

CrowdStrike Named a Frost Radar Leader in Cloud Workload Protection Platforms

CrowdStrike has been named an innovation and growth leader in the 2025 Frost Radar: Cloud Workload Protection Platforms, positioned highest on the Innovation Index among all vendors evaluated. This marks another milestone in our mission to stop breaches with the industry's most unified and comprehensive cloud security solution.

AI Agent Security: Verifying Workflows with AI Firewalls & Guardrails

AI Agent Security: Verifying Workflows with AI Firewalls & Guardrails A10 security experts Jamison Utter, Madhav Aggarwal, and Diptanshu Purwar discuss the importance of context-aware security for AI agents. They emphasize that when automating workflows with AI, it's crucial to ensure that the context fed to the agents and their subsequent actions are verifiable and in line with existing company policies.

Securing AI Part 3: AI Agents - Use Cases and Security

A10 security experts, Jamison Utter, Diptanshu Purwar, and Madhav Aggarwal explore the topic of securing AI agents, which they define as systems that perceive, decide, and act. They discuss: Defining AI Agents: Explaining that agents are not just chatbots, but are the "hands of AI" that can execute actions, call APIs, and automate complex workflows. The Challenge of Security: Discussing how security for AI agents goes beyond traditional model security and includes protecting against prompt injection, malicious instructions, and preventing unsafe actions or data leakage. The Importance of Context and Data.

EP 16 - Sensing the signals: The hidden risks in digital supply chains

Modern digital supply chains are increasingly complex and vulnerable. Professor Levi, a leading expert in cyber resilience and complex systems, explains why traditional prevention isn’t enough and how attackers exploit unseen pathways to infiltrate even the most secure enterprises. The conversation covers the critical need for transparency, continuous monitoring, and rapid detection and recovery in an era where software is built from countless unknown components.

What You Need to Know about the Gucci, Balenciaga, and Alexander McQueen Data Breach

The French luxury conglomerate, Kering, recently confirmed a data breach affecting millions of customers. As a Paris-based luxury group, it has a portfolio of houses in fashion and jewelry. Some of its stable brands include Alexander McQueen, Balenciaga, and Gucci. The cybercriminal group, ShinyHunters, claimed responsibility for the attack. Unlike traditional ransomware groups, which would encrypt the data, they usually monetize by extortion to sell the information on secret forums.

Regulatory Gaps and Legacy Systems Are Aiding AI-Powered Cyberattacks on Governments

Public sector organizations face unprecedented cybersecurity challenges as artificial intelligence reshapes how adversaries launch attacks. Threat actors now use AI to execute large-scale, highly personalized phishing campaigns, automate the discovery of vulnerabilities, and evade detection faster than traditional defenses can respond.

Pentesting: The #1 Security Control to Prove Your Defenses Work

It only takes one mistake for an attacker to gain a foothold. One click on a phishing email, one missed patch, or one default password left in place is often all it takes. The problem is not just the initial mistake, but how far it spreads across your systems. This is why cyber risk is now considered the number one threat to business survival. The numbers tell the story. 60% of SMBs close within six months of a breach.