Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Language Switching Attacks: The New Threat Vector in LLM Security

Language Switching Attacks: The New Threat Vector in LLM Security In this clip from "Securing AI Part 4: The Rising Threat of Hidden Attacks in Multimodal AI," Diptanshu Purwar discusses the growing trend of language-switching attacks. These techniques exploit the ongoing development and training gaps in Large Language Models (LLMs). Diptanshu explains how attackers can evade an LLM's built-in filters and guardrails by rapidly shifting between different languages, particularly less common ones, to find weaknesses where the model's safety data is sparse.

HIPAA checklist: Why your health care clients are at risk (and how to fix it)

The benefits of offering managed services to health care organizations are obvious. The problem? Health care disaster recovery (DR) creates a complex web of compliance requirements that can quickly turn profitable clients into costly liabilities. Health care data breaches average $10.93 million per incident — that's more than double the cost of breaches in other industries. For MSPs serving health care clients, disaster recovery isn't just about getting systems back online.

Understanding the golden ticket attack with Mimikatz

Golden ticket attacks target the KRBTGT account in Active Directory, allowing attackers to forge Kerberos tickets and impersonate domain admins. Tools like Mimikatz make this attack simple and long-lasting, since forged tickets can remain valid for years. Netwrix Threat Manager, Privilege Secure, and Identity Threat Detection & Response (ITDR) help detect anomalies, rotate KRBTGT credentials, and enforce Just-in-Time access to prevent compromise.

Turn AI ambition into secure operations

If you attended AWS re:Invent last year, it probably felt like there was an AI solution for everything. Models, copilots, agents; by the end, someone had to pitch an AI solution to summarize all of the other AI solutions. This year, it may still feel like the AI announcements multiply faster than the models themselves. Under all of the hype, one message still resonates: AI innovation only works when it’s built on a secure foundation.

Key learnings from the 2025 State of Cloud Security study

We have just released the 2025 State of Cloud Security study, where we analyzed the security posture of thousands of organizations using AWS, Azure, and Google Cloud. In particular, we found that: In this post, we provide key recommendations based on these findings, and we explain how you can use Datadog Cloud Security to improve your security posture.

Off the Blocks | Ep. 3: What Does the Future of Onchain Finance Mean to You?

New question. Real answers. No fluff. Welcome back to Off the Blocks — Fireblocks’ rapid-fire video series, shot live at TOKEN2049 Singapore. In Episode 3, we asked industry leaders just one thing: In one sentence, what does the future of onchain finance mean to you? From programmable liquidity to permissioned DeFi, their responses are bold, honest, and sharply focused on what comes next. This is where ideas become infrastructure, and where vision meets execution.

Falcon Exposure Management Network Vulnerability Assessment: Demo Drill Down

CrowdStrike Falcon Exposure Management simplifies network security with its Network Vulnerability Assessment, offering a modern way to secure network infrastructure without complex legacy tools. Learn how the system utilizes your existing Falcon sensors to provide unmatched continuous visibility-instantly correlating new threats against your assets—and leverage authenticated scanning for deeper, more complete vulnerability inspection.