Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Undercover Investigations: How AI is Supercharging Romance Scams

As someone that’s been in the industry for over 20 years, I’ve seen my fair share of online scams. But this is the kind of story you hear and can’t quite believe. At the last RSA cybersecurity conference, a colleague of mine–someone who lives and breathes digital security, a CISO–admitted he’d been taken in by an online romance scam. My first thought was, how?

We Asked 100+ AI Models to Write Code. Here's How Many Failed Security Tests.

If you think AI-generated code is saving time and boosting productivity, you’re right. But here’s the problem: it’s also introducing security vulnerabilities… a lot of them. In our new 2025 GenAI Code Security Report, we tested over 100 large language models across Java, Python, C#, and JavaScript. The goal? To see if today’s most advanced AI systems can write secure code. Unfortunately, the state of AI-generated code security in 2025 is worse than you think.

The Ultimate Guide to Using Text to Speech AI in Videos

In today's world, creating engaging videos is easier than ever, thanks to modern technology. One tool that has become very popular is text to speech AI. This powerful technology helps turn written text into spoken words, making it perfect for adding voiceovers to videos. Whether you're creating educational videos, tutorials, or social media content, text to speech AI can save you time and effort, while still providing a professional sound.

Toptal GitHub Breach Exposes Critical Gaps in Open-Source Security

In a stark reminder of the increasing risk to software supply chains, freelance talent platform Toptal is the latest high-profile organization impacted by a compromise of a GitHub account that led to the deployment of malicious npm packages with the capability to wipe developer machines and steal passwords. The breach, first disclosed last week, has shocked the developer community and exposed serious flaws in repository security, disclosure practices, and package ecosystem hygiene.

Better Prompts for Better Results with Egnyte's Prompt Wizard

Content is core to business operations, and AI is reshaping how teams engage with it. From intelligent summarization and advanced analysis to automated organization, AI streamlines workflows and accelerates decision-making across the enterprise. However, the value of AI-driven capabilities depends on one critical factor: the quality of the input prompt. Well-crafted prompts guide AI to deliver accurate, relevant, and actionable responses.

Business Logic Vulnerabilities Explained: Real Examples, Impact & How to Prevent Them

Imagine an online retailer running a promotion: “Spend $100 this month, get a $25 gift card.” It sounds simple encourage loyal shoppers to spend more. But due to a flaw in the app’s logic, a clever user discovers a loophole. They place enough orders to reach the $100 threshold and receive the gift card. Then, they cancel a small order to drop below the threshold only to make a new one that pushes their total back over $100.

AI Voice Mimicry: How to Protect Yourself From Scams #appsec #cybersecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.