โŒ

Reading view

There are new articles available, click to refresh the page.

CISO Conversations: John โ€˜Fourโ€™ Flynn, VP of Security at Google DeepMind

Flynn has been DeepMindโ€™s VP of security since May 2024. Before then he had been a CISO with Amazon, CISO at Uber, and director of information security at Facebook.

The post CISO Conversations: John โ€˜Fourโ€™ Flynn, VP of Security at Google DeepMind appeared first on SecurityWeek.

All Microsoft Entra Tenants Were Exposed to Silent Compromise via Invisible Actor Tokens: Researcher

The strength of responsible disclosure is that it can solve problems before they are actioned. The weakness is that it potentially generates a false sense of security in the vendor.

The post All Microsoft Entra Tenants Were Exposed to Silent Compromise via Invisible Actor Tokens: Researcher appeared first on SecurityWeek.

Top 25 MCP Vulnerabilities Reveal How AI Agents Can Be Exploited

A new ranking of Model Context Protocol weaknesses highlights critical risksโ€”from prompt injection to command injectionโ€”and provides a roadmap for securing the foundations of agentic AI.

The post Top 25 MCP Vulnerabilities Reveal How AI Agents Can Be Exploited appeared first on SecurityWeek.

Ray Security Emerges From Stealth With $11M to Bring Real-Time, AI-Driven Data Protection

Tel Aviv, Israel-based Ray Security emerged from stealth with $11 million seed funding and a desire to change the way corporate data is protected. The funding was co-led by Venture Guides and Ibex Investors.

The post Ray Security Emerges From Stealth With $11M to Bring Real-Time, AI-Driven Data Protection appeared first on SecurityWeek.

Zero Trust Is 15 Years Old โ€” Why Full Adoption Is Worth the Struggle

Fifteen years after its debut, Zero Trust remains the gold standard in cybersecurity theory โ€” but its uneven implementation leaves organizations both stronger and dangerously exposed.

The post Zero Trust Is 15 Years Old โ€” Why Full Adoption Is Worth the Struggle appeared first on SecurityWeek.

UAEโ€™s K2 Think AI Jailbroken Through Its Own Transparency Features

Researchers exploited K2 Thinkโ€™s built-in explainability to dismantle its safety guardrails, raising new questions about whether transparency and security in AI can truly coexist.

The post UAEโ€™s K2 Think AI Jailbroken Through Its Own Transparency Features appeared first on SecurityWeek.

AI Emerges as the Hopeโ€”and Riskโ€”for Overloaded SOCs

With security teams drowning in alerts, many suppress detection rules and accept hidden risks. AI promises relief through automation and triageโ€”but without human oversight, it risks becoming part of the problem.

The post AI Emerges as the Hopeโ€”and Riskโ€”for Overloaded SOCs appeared first on SecurityWeek.

Ransomware Losses Climb as AI Pushes Phishing to New Heights

Based on real-world insurance claims, Resilienceโ€™s midyear report shows vendor risk is declining but costly, ransomware is evolving with triple extortion, and social engineering attacks are accelerating through AI.

The post Ransomware Losses Climb as AI Pushes Phishing to New Heights appeared first on SecurityWeek.

โŒ