Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI: The Cybersecurity Revolution or Apocalypse? Interview with Steve Wilson at DAVOS 2025

AI is reshaping both innovation and cybercrime, with attackers leveraging its power to outpace traditional defenses. As cybercrime costs surge, organizations must adopt strategies to bridge the cybersecurity skills gap and adopt AI to stay ahead.

Matching AI Strengths to Blue Team Needs

Much has been written about how AI, particularly Large Language Models (LLMs), will transform cybersecurity. Some say it'll be for the worse, and some say it'll be for the better. Although SURGe firmly believes that AI will end up helping defenders much more than it helps threat actors, it's sometimes hard to envision the exact form in which this help will, or should, come.

How AI Can Crack Your Passwords

As AI becomes more advanced, it's important to consider all the ways AI can be used maliciously by cybercriminals, especially when it comes to cracking passwords. Cybercriminals can use AI to perform 3 different types of password-cracking attacks: acoustic side-channel, brute force and dictionary attacks. Learn more about these AI-powered password-cracking attacks.

Simplifying Zero Trust Security for AWS with Teleport

Speakers: Managing secure access has become a critical challenge for organizations using AWS at scale. Traditional security approaches, like passwords and virtual private networks (VPNs), are not sufficient to protect growing infrastructures while maintaining productivity. This webinar, "Simplifying Zero Trust Security for AWS with Teleport," explores how Teleport enables a modern, identity-first approach to AWS access.

How Flexible Filters Enhance API Security #CybersecurityTools #SecurityFilters #ThreatAnalysis

Learn how flexible filtering and session context improve API security. Wallarm enables deep analysis of attacks, from failed logins to SQL injections, using response codes and request types. Discover why session context is essential for identifying and preventing threats.

Treasury Department Breach: A Crucial Reminder for API Security in the Public Sector

The recent cyber breach at the U.S. Treasury Department, linked to state-sponsored Chinese hackers, has set off alarm bells in the public sector. As the investigation continues, this incident reveals a pressing issue that all government agencies must confront: securing their APIs (Application Programming Interfaces).

Launching Opengrep | Why we forked Semgrep

Last month, Semgrep announced major changes to its OSS project—strategically timed for a Friday, of course ;) Since 2017, Semgrep has been a cornerstone of the open-source security community, offering a code analysis engine and rule repository alongside its SaaS product. But their recent moves raise the question: what does “open” really mean?

Announcing Opengrep: Continuing the Open-Source Mission for Static Code Analysis

At Jit, we are proud to announce our participation in a consortium of companies that have come together to launch Opengrep, a continuation of Semgrep’s groundbreaking OSS. Opengrep is born out of our shared commitment to keeping static code analysis open, accessible, and community-driven.

5 AI Scams You Need To Be Aware Of In 2025

AI is revolutionizing our lives in terms of productivity, automation, customer service, and more. AI is becoming so important that organizations increased spending on compute and storage hardware infrastructure for AI deployments by 37% year-over-year in the first half of 2024, reaching $31.8 billion. However, like most technological advances, the good often comes with the bad.