Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Actors Are Increasingly Abusing AI Tools to Help With Scams

Cybercriminals are increasingly using AI tools to assist in malicious activities, according to Microsoft’s latest Cyber Signals report. “AI has started to lower the technical bar for fraud and cybercrime actors looking for their own productivity tools, making it easier and cheaper to generate believable content for cyberattacks at an increasingly rapid rate,” the report says.

Torq HyperSOC is the first Autonomous SOC Platform with Native Model-Context Protocol (MCP) Support

Innovation in cybersecurity technology, particularly in security operations, is advancing at an incredible pace. The past few months have seen a surge in announcements of Agentic AI solutions and SOC Analyst AI Agents, transforming the landscape rapidly. At BlackHat USA 2023, Torq pioneered this space by introducing Socrates, the first AI Agent SOC Analyst. This highlights the remarkable acceleration of AI adoption in cybersecurity and the significant advancements made in a relatively short period.

Agent In the Middle - Abusing Agent Cards in the Agent-2-Agent (A2A) Protocol To 'Win' All the Tasks

I think you’ll agree with me that growth in the AI landscape is pretty full-on at the moment. I go to sleep and wake up only to find more models have been released, each one outdoing the last one by several orders of magnitude, like some kind of Steve Jobs’ presentation on the latest product release, but on a daily loop. With these rapid developments, security must keep up or it will be left behind.

How to Supercharge Your AI Projects Using Cloud-Based GPUs and Kubernetes

Ever tried training an AI model and felt like your system was just too slow? Or maybe you've wanted to scale a machine learning project but didn't know how to handle the setup? If you're nodding along, you're not alone. AI takes power, and with the right cloud tools, that power is right at your fingertips. Let's break down how cloud-based GPUs and Kubernetes can give your projects the boost they deserve.

Cato CTRL Threat Research: Inside Shadow AI - Real-World Generative AI Application Usage Trends in SASE

The rapid adoption of generative AI (GenAI) in the enterprise is introducing a new category of unmanaged risk known as shadow AI. Organizations frequently lack insight into which employees are using GenAI tools and how they are being accessed, resulting in visibility limitations, policy enforcement challenges, and increased risk of data exposure. Security teams face potential data leaks and compliance violations, while IT teams struggle to integrate GenAI usage into existing governance models.

Understanding MCP: Security Implications

MCP, short for Message Communication Protocol, refers to a category of protocols used for exchanging structured messages between systems or applications. It was developed primarily to meet the communication needs of early enterprise systems that required: MCP protocols are often seen in banking, insurance, healthcare, and telecom industries—sectors where many systems were developed before APIs became mainstream.

Building DLP for a ChatGPT World

Generative AI has gone from a novelty to an essential part of daily workflows across all teams at an organization. Whether it’s ChatGPT, Microsoft Copilot, Claude, or Google Gemini, employees are using chatbots to copy, paste, summarize, and query data at a pace and scale we have never seen before. Unfortunately, data security has not been a fundamental feature of generative AI as the technology’s popularity and functionality has exploded.