Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing the Arctic Wolf AI Security Assistant: Providing Value for Security Operations for Beta Customers

Arctic Wolf recently introduced its AI Security Assistant, a cutting-edge generative AI security assistant designed to enhance security operations within the Aurora Platform. This innovative tool is now in beta and promises to deliver deeper security expertise instantly to users.

Can threat actors make ChatGPT malware? #ai #cybersecurity #gpt5

GPT-5 was jailbroken in under 24 hours using simple "storytelling" techniques that bypass safety guardrails. The key insight from our podcast? Individual AI requests appear legitimate but become dangerous when combined. Bad actors can request network code in one session, convincing emails in another, and credential collection forms in a third. Each task seems normal individually, but together they form a complete phishing toolkit.

How a volunteer-run wildfire site in Portugal stayed online during DDoS attacks

On July 31, 2025, just as Portugal entered the peak of another intense wildfire season, João Pina, also known as Tomahock, received an automated alert from Cloudflare. His volunteer-run project, fogos.pt, now a trusted source of real-time wildfire information for millions across Portugal, was under attack. One of the several alerts fogos.pt received related to the DDoS attack.

MURKY PANDA: A Trusted-Relationship Threat in the Cloud

Since 2023, CrowdStrike Services and CrowdStrike Counter Adversary Operations have investigated multiple intrusions conducted by MURKY PANDA, a sophisticated adversary leveraging advanced tradecraft to compromise high-profile targets. MURKY PANDA, active since at least 2023, is a cloud-conscious adversary with a broad targeting scope; the adversary’s operations have particularly focused on government, technology, academia, legal, and professional services entities in North America.

Can You Kill an API Token in Real Time? Here's Why It Matters #apikeys #api #incidentresponse

What happens if an API token or key is compromised? The ability to instantly revoke or block tokens during an incident is critical to stopping attackers. In this clip, Wallarm and Oracle experts discuss real-world challenges in detecting and disabling malicious tokens—and why mature incident response and tooling are essential for API security.

How to lead with confidence in the AI era: a conversation with Nancy Wang, VP, Engineering

Artificial Intelligence (AI) is reshaping how we work and lead. At 1Password, we see AI as a powerful accelerator that helps our teams focus on the work that matters most. To explore what it means to lead in this new era, we sat down with Nancy Wang, VP/Head of Engineering. Nancy shares how AI shows up in her day-to-day, how she inspires her team to be curious, and why human skills like trust matter more than ever.

Why AI Agents and MCP Servers Just Became a CISO's Most Urgent Priority

Over the last year, I’ve spent countless hours with CISOs, CTOs, and security architects talking about a new wave of technology that’s changing the game faster than anything we’ve seen before: Agentic AI and Model Context Protocol (MCP) servers. If you think AI is still in the “cool demos and pilot projects” stage, think again. We’re already seeing autonomous agents reasoning, remembering, and taking actions in live production environments.

Is iCloud Keychain Secure?

Apple users have a variety of tools and services integrated into its ecosystem, such as Notes, Pages, Keynote, Reminders, Calendar, Mail, and more. One of these services is iCloud Keychain, an integrated password manager within the Apple product suite to autofill your passwords when logging in to your account, share passwords with family, and sync your details across your Apple devices.

What C-Levels Should Know About Enterprise Cloud Backup

Enterprise cloud backup keeps your business running when disaster strikes. Organizations lose an average of $5,600 per minute during downtime, making reliable data protection non-negotiable for companies running applications across multiple clouds, containers, and virtual environments. Traditional backup methods fail with modern distributed infrastructure; you need enterprise backup strategies that scale with your actual environment, not outdated approaches that worked a decade ago.