Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Secure Your AI Workflows with Protecto's Data Masking API #startup #n8n

AI is evolving fast, but are your workflows truly secure? Most teams rely on DLP or redaction tools that strip sensitive data or block it entirely — but that limits your AI's potential. In this video, learn how Protecto’s SaaS Masking & Unmasking APIs help you process sensitive data (PII, PHI, PCI) securely, while staying compliant with GDPR, HIPAA, DPDP. No more trade-offs between data protection and powerful AI.

Intel Chat: Tomiris cyber-espionage, OpenPLC ScadaBR, NPM manipulates AI scanners & MuddyWater [273]

Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

You Can't Have AI Security Without API Security

For most leadership teams, the question is no longer if they’ll use AI, but how to turn it into measurable business value. Success hinges on the APIs that feed, govern, and scale AI initiatives — and whether your strategy is built for speed, security, and cost efficiency. From accelerating product development to delivering real-time customer experiences, the business case for AI is clear. But without the right API strategy, AI initiatives risk falling short — driving up costs, creating compliance gaps, and limiting ROI.

Securing Agentic AI: Visibility and Protection for MCP Servers and A2A Traffic

AI agents aren’t just talking, they’re taking actions. They’re booking transactions, pulling sensitive data, and chaining tools together to get work done. As enterprises embrace these agents, protocols like the Model Context Protocol (MCP) and Agent-to-Agent (A2A) are enabling powerful new capabilities, but also creating invisible ecosystems of API-driven agent activity that traditional security tools can’t see or control.

When Al Agents go Rogue: What you're Missing in your MCP Security

No Fluff, Just Real-World Threats This isn’t your typical marketing webinar. We cover what Agentic AI actually looks like in production, how MCP servers work to broker instructions, and what kind of new threats are emerging. Agentic AI isn’t coming. It’s already here. Autonomous agents are now operating in production environments, reasoning, remembering, and taking real actions across your systems. They’re not just generating content. They’re triggering workflows, modifying records, and making decisions. And they’re doing it over APIs.

How Salt Security & AWS Simplify API Security

See your Blind Spots in Minutes, not Months: How Salt Security & AWS Simplify API Security AI agents and cloud-native architectures have unleashed a wave of APIs and with them, new attack surfaces. Most security teams are struggling to keep up, especially in dynamic AWS environments where shadow and zombie APIs can easily go undetected. This Salt Security and AWS webinar explores a better approach to API discovery and security in AWS without the burden of in-line traffic collection or sensor deployments.

Top Trends in Deception Technology: Predictions for 2026

Attackers thrive on ambiguity. They blend into normal traffic, pivot between cloud and on-prem systems, and use valid credentials to move quietly. Your conventional controls—while essential—often fire only after risky actions are taken on real assets. Cyber deception flips that sequence: it places deception decoys, breadcrumbs, and fake assets in the attacker’s path so that any touch is a high-fidelity signal.

The Resurgence of Mirai: Jackskid Botnet and Escalating IoT Threats in November 2025

The Mirai botnet, first unleashed in 2016, continues to evolve into increasingly sophisticated variants, posing severe risks to the Internet of Things(IoT) ecosystem. This report examines the Jackskid Botnet—a newly identified Mirai derivative—characterized by its aggressive propagation via zero-day exploits and brute-force attacks, resulting in daily active bot IPs surpassing 40,000 as of late November 2025.

How AI agent privileges are redefining cyber insurance expectations

When ransomware drove record losses, insurers began scrutinizing basic controls like multi-factor authentication (MFA), backups, and endpoint detection. Now, AI-driven automation is introducing a new category of risk—AI agents—and insurers are responding with heightened attention to privilege management. AI agents are non-human identities that can approve payments, access sensitive data, and execute commands using powerful API keys.

Cato CTRL Threat Brief: "React2Shell" Vulnerability Targeting React Server Components

On Wednesday, December 3, a critical remote code execution (RCE) vulnerability in React Server Components (RSC), dubbed React2Shell (CVE-2025-55182), was disclosed. The CVE was discovered by security researcher Lachlan Davidson. It quickly gained traction with multiple third-party proof of concepts (PoCs) being published of varying quality and credibility.