Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Agentic AI Revolution: 5 Unexpected Security Challenges

As we stand on the brink of the agentic AI revolution, it’s crucial to understand the profound impact AI agents will have on how people, applications and devices interact with systems and data. This blog post aims to shed light on these changes and the significant security challenges they bring. It’s important to note that given the rapid pace of advancements in this field, we could not have anticipated many of the challenges discussed here just a few months ago.

What's On the Horizon for AI Risk Management

Sam Altman’s recently published “Reflections” blog is one of those pieces that made me stop mid-scroll and wonder, “We’re really right in it, aren’t we?” Part think piece, part reality check, it’s a fascinating article that balances enthusiasm for AI’s potential with the very real warning signs flashing over all our heads.

Government Cuts Leave Cybercrime Victims Behind

The Mayor of London has cut funding for victims of online crime in the capital at a time when 98% of reports to the police are given ‘no further action’. In fact, victims are seven times less likely to see their perpetrator charged or summoned compared to victims of offline crime. From the 1st of April 2025, dedicated online crime victim services will be shut down and thousands of victims will go without specialist support.

Protect Yourself from Job Termination Scams

ESET warns of a wave of phishing attacks informing employees that they’ve been fired or let go. The emails are designed to make the user panic and act quickly to see if they’ve actually lost their job. If a user falls for the attack, they’ll be tricked into downloading malware or handing over their login credentials.

Protect Your Devices: Mobile Phishing Attacks Bypass Desktop Security Measures

Zimperium warns of a surge in phishing attacks specifically tailored for mobile devices. These attacks are designed to evade desktop security measures in order to breach organizations through employees’ smartphones. Mobile phishing includes SMS phishing (smishing), QR code phishing (quishing), voice phishing (vishing), and mobile-targeted email phishing.

Error Message Vulnerabilities: Why You Should Care About Information Exposure

Ever get one of those annoying error messages on your phone that gives way too much detail? You know, the ones that tell you the line of code that failed or the exact database query that crashed the app. As an app user, you may dismiss the message and move on. But did you know those overly verbose error messages could be exposing your personal data?

Gartner's AI TRiSM Market Guide Validates the Urgency of AI Agent Security

AI Agents are not just another tech trend; they are fundamentally reshaping how enterprises operate. These autonomous systems are deeply embedded into workflows, making real-time decisions, executing tasks, and integrating across an organization’s most critical systems. With this shift comes an undeniable reality: enterprises are handing over operational control to AI-driven entities without the necessary governance and security frameworks in place.

Why Pen Testing Is Essential in Today's Cyber Threat Landscape

The digital frontier is expanding quickly, with organizations across every industry depending on interconnected systems to communicate, store data, and drive innovation. However, as technology evolves, malicious actors also refine their tactics. This article examines key defenses that protect today's infrastructures.

Sue Bergamo - Confidentiality, Integrity, and Availability - CIA Triad

“This isn't a job for the faint of heart. If people can't understand the triad that CISOs abide by—confidentiality, integrity, and availability—then it’s our job to make them understand.” Sue Bergamo Exciting news! In our latest episode of Data Security Decoded, we had the pleasure of hosting Sue Bergamo, CIO and CISO at BTE Partners.

How AI-Automated Fuzzing Uncovered a Vulnerability in wolfSSL

Despite wolfSSL’s rigorous software testing practices, in October 2024, Code Intelligence—an application security vendor—discovered a potentially exploitable defect in wolfSSL. Remarkably, the potential vulnerability was found without human intervention. The only manual step was executing a single command to trigger autonomous fuzz testing. Watch the video for a live demo of AI-automated fuzzing.