Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

xonPlus Launches Real-Time Breach Alerting Platform for Enterprise Credential Exposure

xonPlus, a real-time digital risk alerting system, officially launches today to help security teams detect credential exposures before attackers exploit them. The platform detects data breaches and alerts teams and systems to respond instantly. Built by the team behind XposedOrNot, an open-source breach detection tool used by thousands, xonPlus gives organizations instant visibility when their email addresses or domains appear in breach dumps or dark web forums.

What Is AI Penetration Testing? A Guide to Autonomous Security Testing

AI penetration testing is changing how organizations identify and exploit vulnerabilities. Instead of relying on traditional manual tests or basic automated scans, autonomous systems now simulate attacker behavior continuously and at scale. These systems use agentic AI to execute real-world exploits, reduce noise, and shift security left, all while keeping human experts focused on the creative flaws machines can’t yet catch.

Securing AI-Generated Code: Why It Matters

Securing AI-Generated Code: Why It Matters In this video, A10's Madhav Aggarwal explains how using AI for coding is an excellent use case, but the code generated by AI must be safe and secure. As AI and large language models (LLMs) become central to enterprise strategy, securing these powerful workloads is no longer optional—it's essential. A10 Networks' security leaders, Jamison Utter, Madhav Aggarwal, and Diptanshu Purwar, explore the growing security risks associated with AI/LLM adoption and what organizations must do to stay protected.

Security is a Critical Factor in AI Adoption

Security is a Critical Factor in AI Adoption Jamison Utter joins A10's GenAI experts Madhav Aggarwal and Diptanshu Purwar to discuss the critical importance of security for AI adoption. They cover how AI fundamentally shifts the attack surface, requiring a move from traditional rule-based pattern matching to understanding natural language semantics. The team emphasizes the need for alignment in AI to ensure models are "helpful, harmless, and honest" (the 3H philosophy) and highlights the role of red teaming and guardrails in preventing vulnerabilities, such as prompt injection.

Mastering the Cyber Incident Response Playbook: A CISO's Guide to Readiness and Resilience

In today’s volatile cyber landscape, having a cyber incident response playbook is not a luxury— it’s a necessity. For CISOs and IT leaders across industries like healthcare, BFSI, public sector, and telecommunications, a well-crafted playbook is the backbone of organizational resilience. It empowers teams to respond effectively, mitigate damage, and recover swiftly from breaches.

The MemcycoFM Show: Episode 8 - What to Look for in a Phishing Site Detection and Takedown Solution

The stark challenge to modern phishing site detection is that the efficacy of a detection strategy is now measured in seconds, not hours. In 2024, threat actors stole credentials in a median of 49 seconds from the moment a phishing email was opened, according to Verizons’s Data Breach Investigation Report (DIBR) report. Given this reality, relying on scanning and takedown or traditional threat intelligence feeds – that inherently lag behind real-time user engagement – is no longer a viable defense against even unsophisticated credential theft and account takeover (ATO) scams.