What Role Does Agentic AI Play in Enhancing Digital Security Processes? The question of digital security is more pertinent than ever before. Where Non-Human Identities (NHIs) are consistently growing, how can organizations ensure their security processes are up to speed?…
Category: Security Boulevard
How smart are NHIs in managing complex security environments
How Do Non-Human Identities (NHIs) Enhance Security in Complex Digital Environments? Have you ever considered how machine identities, known as Non-Human Identities (NHIs), revolutionize cybersecurity? Understanding and managing NHIs can be critical in safeguarding complex security environments. From finance to…
Does implementing Agentic AI fit the budget of SMBs
Can Non-Human Identities Bridge the Security Gap in Your Organization? Where machine-to-machine communication is essential, do you ever wonder how secure your organization’s machine identities really are? The management of Non-Human Identities (NHIs) plays a crucial role in addressing this…
Can Agentic AI effectively handle enterprise security needs
Are Non-Human Identities the Key to Strengthening Enterprise Security? How can organizations ensure a robust enterprise security framework that effectively handles their unique needs? The answer may be in strategic management of Non-Human Identities (NHIs). These machine-generated identities, often paired…
Attackers Have Been Exploiting Cisco SD-WAN Zero-Day Flaw Since 2023
Cisco and Five Eyes agencies are alerting organizations to a highly sophisticated attack, where threat actors compromise a Cisco SD-WAN controller via a zero-day flaw, downgrade the device to an earlier software version that is vulnerable to an older bug,…
NDSS 2025 – Retrofitting XoM For Stripped Binaries Without Embedded Data Relocation
Session 13D: Software Security: Code and Compiler Authors, Creators & Presenters: Chenke Luo (Wuhan University), Jiang Ming (Tulane University), Mengfei Xie (Wuhan University), Guojun Peng (Wuhan University), Jianming Fu (Wuhan University) PAPER Retrofitting XoM For Stripped Binaries Without Embedded Data…
How AI Agents Automate CVE Vulnerability Research
The CVE Researcher is a multi-agent AI pipeline that automates vulnerability research, detection template generation, and exploitation analysis. Built on Google’s Agent Development Kit (ADK), it coordinates specialized AI models through four phases — deep research, technology reconnaissance, actor-critic template…
Emulating the Systematic LokiLocker Ransomware
AttackIQ has released a new attack graph that emulates the behaviors of LokiLocker ransomware, a .NET based strain active since at least mid-August 2021. The malware combines defense evasion and impact techniques, including disabling Task Manager and Windows Firewall, as…
Preventing Breaches – MFA on Remote Access to Linux, Unix, and Infrastructure Systems
Most breaches don’t start with malware or zero-day exploits. They start with a login. An attacker gets hold of a password, maybe through phishing, reuse, or a leaked credential dump. They test it against a remote system. An SSH prompt appears. The credentials work. From there, everything unfolds…
The 2026 CISO Mandate: Proactive, Passwordless, and Context-Aware Identity Assurance
In our opinion, Gartner’s 2026 research reflects this broader evolution. Identity has expanded beyond perimeter controls and point-in-time authentication to encompass verification of the human, contextual risk assessment, and automated trust decisions. The post The 2026 CISO Mandate: Proactive, Passwordless,…
Early 2026 is Proving KasadaIQ’s AI Predictions
AI agents have moved from experimental to operational. Now security teams must verify agent identity, intent, and trust before automation becomes exploitation. The post Early 2026 is Proving KasadaIQ’s AI Predictions appeared first on Security Boulevard. This article has been…
Analysis: Root Cause of Most Security Incidents Traced to Unpatched Firewalls
An analysis of more than two trillion IT events collected during 2025 by Barracuda Networks finds 90% of ransomware incidents exploited firewalls via unpatched software or a vulnerable account that enables cybercriminals to gain access to an IT environment. Merium…
NDSS 2025 – Translating C To Rust: Lessons From A User Study
Session 13D: Software Security: Code and Compiler Authors, Creators & Presenters: Ruishi Li (National University of Singapore), Bo Wang (National University of Singapore), Tianyu Li (National University of Singapore), Prateek Saxena (National University of Singapore), Ashish Kundu (Cisco Research) PAPER…
Life in the Swimlane with Chris Mallow, Partner Solutions Architect
The post Life in the Swimlane with Chris Mallow, Partner Solutions Architect appeared first on AI Security Automation. The post Life in the Swimlane with Chris Mallow, Partner Solutions Architect appeared first on Security Boulevard. This article has been indexed…
The AI Agent Identity Crisis: 80% of Agents Don’t Properly Identify Themselves, 80% of Sites Don’t Verify
AI agent identity verification fails at both ends. DataDome tested 698,000 sites—80% couldn’t detect spoofed ChatGPT traffic. Here’s why. The post The AI Agent Identity Crisis: 80% of Agents Don’t Properly Identify Themselves, 80% of Sites Don’t Verify appeared first…
APT37 Adds New Capabilities for Air-Gapped Networks
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign, tracked as Ruby Jumper by ThreatLabz, APT37 uses Windows shortcut (LNK) files…
What to Know About the Notepad++ Supply-Chain Attack
The cybersecurity community is still grappling with a sobering realization: one of the most ubiquitous tools in the developer’s toolkit, Notepad++, was hiding a critical vulnerability for over six months. The post What to Know About the Notepad++ Supply-Chain Attack…
Shifting Security Left for AI Agents: Enforcing AI-Generated Code Security with GitGuardian MCP
In this article, we will explore the hot topic of securing AI-generated code and demonstrate a technical approach to shifting security left for cloud AI agents by using Model Context Protocol (MCP) tools. The post Shifting Security Left for AI…
Accelerate Secure Releases With Microsoft Copilot and Sonatype Guide
AI coding assistants, such as Microsoft Copilot, are fundamentally transforming the process of software development. Developers can generate scaffolding, draft functions, update dependencies, and even build full applications in seconds. The speed is real, and so is the productivity boost.…
What is Polymorphic Malware?
Malware continues to evolve, becoming more sophisticated and harder to detect. One of the most challenging types is polymorphic malware — malicious software that constantly changes its code to evade detection by traditional security systems. In a world where cyber…