AI Security Software Supply Chain2 Min Read December 2, 2025 Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools Cybersecurity researchers have disclosed details of an npm package that attempts to influence artificial intelligence (AI)-driven security…
AI Security Enterprise Security5 Min Read November 26, 2025 When Your $2M Security Detection Fails: Can your SOC Save You? Enterprises today are expected to have at least 6-8 detection tools, as detection is considered a standard investment and the first line of…
AI Security SaaS Security2 Min Read November 19, 2025 ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts Malicious actors can exploit default configurations in ServiceNow's Now Assist generative artificial intelligence (AI) platform and leverage…
AI Security Cyber Espionage3 Min Read November 14, 2025 Chinese Hackers Use Anthropic's AI to Launch Automated Cyber Espionage Campaign State-sponsored threat actors from China used artificial intelligence (AI) technology developed by Anthropic to orchestrate automated cyber…
AI Security Regulatory Compliance6 Min Read November 11, 2025 CISO's Expert Guide To AI Supply Chain Attacks AI-enabled supply chain attacks jumped 156% last year. Discover why traditional defenses are failing and what CISOs must do now to protect…
AI Security Breach Simulation6 Min Read October 30, 2025 The Death of the Security Checkbox: BAS Is the Power Behind Real Defense Security doesn't fail at the point of breach. It fails at the point of impact. That line set the tone for this year's Picus Breach and…
AI Security Vulnerability4 Min Read October 27, 2025 ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands The newly released OpenAI Atlas web browser has been found to be susceptible to a prompt injection attack where its omnibox can be jailbroken…
AI Security Cloud Security2 Min Read October 1, 2025 Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover A severe security flaw has been disclosed in the Red Hat OpenShift AI service that could allow attackers to escalate privileges and take…
AI Security Vulnerability2 Min Read September 25, 2025 Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection Cybersecurity researchers have disclosed a critical flaw impacting Salesforce Agentforce, a platform for building artificial intelligence (AI)…
AI Security Vulnerability5 Min Read September 24, 2025 Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models Cybersecurity researchers have disclosed two security flaws in Wondershare RepairIt that exposed private user data and potentially exposed the…
AI Security Cloud Security7 Min Read September 22, 2025 How to Gain Control of AI Agents and Non-Human Identities We hear this a lot: "We've got hundreds of service accounts and AI agents running in the background. We didn't create most of them. We don't…
AI Security Shadow IT4 Min Read September 17, 2025 Rethinking AI Data Security: A Buyer's Guide Generative AI has gone from a curiosity to a cornerstone of enterprise productivity in just a few short years. From copilots embedded in…
AI Security Cybercrime3 Min Read September 17, 2025 RaccoonO365 Phishing Network Dismantled as Microsoft, Cloudflare Take Down 338 Domains Microsoft's Digital Crimes Unit said it teamed up with Cloudflare to coordinate the seizure of 338 domains used by RaccoonO365, a financially…
AI Security Enterprise Security3 Min Read September 16, 2025 Securing the Agentic Era: Introducing Astrix's AI Agent Control Plane AI agents are rapidly becoming a core part of the enterprise, being embedded across enterprise workflows, operating with autonomy, and making…
AI Security Vulnerability4 Min Read September 12, 2025 Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories A security weakness has been disclosed in the artificial intelligence (AI)-powered code editor Cursor that could trigger code execution when a…
AI agents AI councils AI Security Ascend AI Black Hat 2025 Defend AI Ransomware Spotlight Straiker3 Min Read September 9, 2025 Innovator Spotlight: Straiker The AI Security Frontier: Protecting Tomorrow’s Digital Landscape Cybersecurity leaders are facing an unprecedented challenge. As…