GPU-accelerated AI workloads now run on Kubernetes in the large majority of enterprise environments. Managing those workloads at scale has required specialized tooling that, until now, remained under vendor control. NVIDIA moved to change that at KubeCon Europe in Amsterdam…
Category: Help Net Security
Microsoft details AI prompt abuse techniques targeting AI assistants
Prompt abuse occurs when crafted inputs manipulate an AI system into producing unintended behavior, such as attempting to access sensitive information or overriding built-in safety instructions. Prompt injection is also recognized as one of the top risks in the 2025…
Vulnerabilities from years ago still opening doors for attackers
Exploitation timelines continued to compress in enterprise environments, with newly disclosed flaws reaching active use almost immediately and older weaknesses remaining active years after disclosure. (Source: Cisco Talos) Findings from Cisco Talos’ 2025 Year in Review show how attackers combined…
AiStrike cuts alert noise with Continuous Detection Engineering
AiStrike has launched Continuous Detection Engineering, a capability that transforms how security operations teams manage detections, shifting from reactive alert triage to proactive, intelligence-driven optimization. The detection quality gap Security teams today are overwhelmed by alerts, but the root cause…
Protos AI delivers agent-driven threat intelligence without vendor lock-in
Protos Labs has announced the launch of a freemium edition of Protos AI, a platform that deploys specialized AI agents augmenting cyber threat intelligence (CTI) analyst teams by executing structured investigations from planning to reporting. The new tier enables security…
Check Point unveils AI Defense Plane to govern and secure enterprise AI systems
Check Point has announced the Check Point AI Defense Plane, a unified AI security control plane designed to help enterprises govern how AI is connected, deployed, and operated across the business. As AI systems move from assistants to autonomous actors…
Tuskira replaces centralized detection model with real-time, distributed approach
Tuskira has released its Federated Detection Engine, a new capability within its Agentic SecOps platform that enables real-time threat detection across cloud, identity, endpoint, network, SaaS, infrastructure, and legacy SIEM environments, without relying on centralized logging. Detection engineering still depends…
Lumu enhances Defender to detect compromise across network, cloud, endpoint, and identity
Lumu has upgraded its Lumu Defender NDR solution, extending Continuous Compromise Assessment beyond the network to include endpoints, cloud environments, and user behavior for unified visibility. The past year marks a strategic shift in attack methods, with threat actors pivoting…
SecurityScorecard automates third-party risk management with TITAN AI
SecurityScorecard has introduced TITAN AI to automate third-party risk management, replacing manual processes with continuous, AI-driven intelligence. TITAN AI is built on top of SecurityScorecard’s Ratings and TPRM platform with AI-driven technology and enhanced threat intelligence, delivering a powerful solution…
GitHub-hosted malware campaign uses split payload to evade detection
A large-scale malware delivery campaign has been targeting developers, gamers, and general users through fake tools hosted on GitHub, Netskope researchers have warned. These “lures” are highly polished and appear legitimate, occasionally mimicking real projects, thus making them difficult to…
Dell expands security stack with quantum-ready protections and AI threat detection
Dell Technologies has introduced new security by design and cyber resilience capabilities to help organizations secure, detect and recover from next-generation threats. The enhancements address emerging risks from quantum computing and AI by hardening device foundations, strengthening cyber resilience when…
ZeroTier Quantum brings quantum-resistant security to high-performance global networking
ZeroTier has launched ZeroTier Quantum, a software-defined networking platform designed for data center–level performance and built with quantum-resistant cryptography aligned with NIST and NSA CNSA 2.0 standards. Organizations operate far beyond network boundaries, autonomous devices, machines, vehicles, agents, and infrastructure…
Coro automates security operations with end-to-end threat detection and response
Coro has expanded AI-driven security operations capabilities that automate the full lifecycle of threat detection and response, enabling organizations to identify, investigate, and remediate security incidents without manual intervention. The announcement builds on Coro’s intrinsic use of AI across its…
Zenity advances context-aware security for AI agents
Zenity has unveiled continuous, contextual security for AI agents, a new approach that transforms how enterprise AI systems are secured and sets the foundation for Guardian Agents. According to Gartner, “Guardian Agents represent the next evolution in AI governance, shifting…
GitHub just made it much harder to ship a vulnerable pull request
GitHub is expanding its application security capabilities with AI-powered security detections designed to identify risks earlier in the development process, with public preview planned for early Q2. The update is intended to improve code scanning, secret detection, and dependency analysis…
Cisco builds security framework for safe enterprise adoption of AI agents
Cisco has introduced solutions to address AI security issues and remove a top barrier to agent adoption. By establishing trusted identities, enforcing strict zero trust Access controls, hardening agents before deployment, enforcing guardrails at runtime, and giving SOC teams the…
RSA ID Plus Sovereign Deployment delivers full-stack identity for high-risk environments
RSA has unveiled RSA ID Plus Sovereign Deployment, a high-assurance identity solution built for organizations requiring continuous availability, data sovereignty, and resilience against advanced threats. RSA ID Plus Sovereign Deployment is the next evolution in RSA ID Plus, the identity…
GitHub leans on hybrid detection model to expand vulnerability coverage
GitHub is expanding its application security capabilities with AI-powered security detections designed to identify risks earlier in the development process, with public preview planned for early Q2. The update is intended to improve code scanning, secret detection, and dependency analysis…
Palo Alto Networks’ Prisma AIRS 3.0 closes visibility gaps in autonomous AI systems
Palo Alto Networks has advanced its AI security platform with Prisma AIRS 3.0, securing the agentic AI lifecycle and enabling enterprises to move from observation to safe autonomous execution. The shift toward an AI-powered enterprise introduces systemic security challenges, ranging…
Relyance AI’s Lyo addresses data security gaps in autonomous systems
Relyance AI has announced the commercial availability of Lyo, an autonomous data defense engineer that monitors and secures how AI agents interact with enterprise data. Lyo emerges at an inflection point for the cybersecurity industry as autonomous AI agents spread…