Category: EN

Claude Code Security: The AI Shockwave Hitting Cybersecurity

Anthropic’s Claude Code Security research preview promises AI-powered code analysis and vulnerability detection at scale. The announcement triggered strong reactions across the cybersecurity community and sent several vendor stocks lower. In this episode, we break down what the tool actually…

Security debt is becoming a governance issue for CISOs

Application security backlogs keep expanding across large development portfolios. Veracode’s 2026 State of Software Security Report puts numbers behind a familiar operational pattern, fixes lag discovery, and older weaknesses stay open across release cycles. 2026 findings against the 2025 baseline…

Quitbro – 22,874 breached accounts

In February 2026, the porn addiction app Quitbro allegedly suffered a data breach that exposed 23k unique email addresses. The data also included users’ years of birth, responses to questions within the app and their last recorded relapse time. The…

BlacksmithAI: Open-source AI-powered penetration testing framework

BlacksmithAI is an open-source penetration testing framework that uses multiple AI agents to execute different stages of a security assessment lifecycle. A multi-agent structure for offensive workflows BlacksmithAI runs as a hierarchical system in which an orchestrator coordinates task execution…

When cyber threats start thinking for themselves

In this Help Net Security video, Jason Rivera, Field CISO & Head of Solution Engineering at SimSpace, discusses how autonomous AI agents are changing cyber threats. Drawing on experience in the US Army, NSA, Deloitte, and CrowdStrike, he describes how…

AI risk moves into the security budget spotlight

Enterprises are pushing AI deeper into workflows that touch sensitive data across cloud platforms and SaaS apps. The 2026 Thales Data Threat Report, based on a survey of 3,120 respondents in 20 countries, places that shift alongside growing pressure on…

KomikoAI – 1,060,191 breached accounts

In February, the AI-powered comic generation platform KomikoAI suffered a data breach. The incident exposed 1M unique email addresses along with names, user posts and the AI prompts used to generate content. The exposed data enables the mapping of individual…

Anomalous Context Injection Detection in Post-Quantum Environments

Learn how to detect anomalous context injections in MCP deployments using post-quantum cryptography and ai-driven behavioral analysis to prevent puppet attacks. The post Anomalous Context Injection Detection in Post-Quantum Environments appeared first on Security Boulevard. This article has been indexed…

Are current AI systems adaptable to new cyber threats

How Prepared Are AI Systems Against Emerging Cyber Threats? Can Artificial Intelligence (AI) really keep up with evolving cyber threats? With technology evolves at an unprecedented pace, so do the tactics and techniques employed by cybercriminals. This poses a critical…

How proactive is your AI in detecting cyber threats

How Do Non-Human Identities Enhance AI Threat Detection? Is your organization leveraging Non-Human Identities (NHIs) to elevate its cybersecurity strategy? Managing NHIs becomes a pivotal factor in ensuring robust cloud security and improving AI threat detection capabilities. Understanding and managing…