Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Exabeam Agent Behavior Analytics: First-of-Its-Kind Behavioral Detections for AI Agents

AI agents are moving into real workflows faster than most teams expected. According to PwC’s 2025 AI Agent Survey, 79% of companies are already adopting AI agents, and 88% of executives expect to increase AI-related budgets in the next year. These agents are now handling research, summarization, customer engagement, and operational tasks at a scale humans can’t match.

AI Agent-to-Agent Communication: The Next Major Attack Surface

We are witnessing the end of the "Human-in-the-Loop" era and the beginning of the "Agent-to-Agent" economy. Until recently, most AI interactions were hub-and-spoke models where a human user prompted a central model, reviewed the output, and then took action. That model provided a natural safety brake. If the AI hallucinated or suggested a malicious action, a human was there to catch it. That safety brake is disappearing.

How MCP Servers Can Propagate Prompt Injection #mcp #promptinjection #aisecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Find user activity across endpoints with Claude Code #cybersecurity #ai #securityoperations

Watch Claude Code query LimaCharlie telemetry to locate user activity across all endpoints in an organization. The agent correlates events across process execution, login sessions, and network connections to identify the most recent user activity and establish behavioral patterns. Security analysts can investigate user presence without manually searching through telemetry streams.

PHISHING GOT 10X FASTER WITH AI #apisecurity #phishing #aisecurity #DevSecOps #applicationsecurity

PHISHING GOT 10X FASTER Phishing attacks sped up 10x thanks to AI what took weeks is now compressed to hours. Vulnerabilities are discovered continuously and scaled instantly Attacks became adaptive and contextual for 2025 cybersecurity In this short clip from our webinar, we break down why this is the new reality.

Inside the Human-AI Feedback Loop Powering CrowdStrike's Agentic Security

Adversaries are continuously evolving their tactics, techniques, and procedures to evade both legacy and AI-native defenses, and they’re using AI to their advantage. Stopping them requires a new approach: humans and AI working together. While AI can correlate massive volumes of telemetry at machine speed, pattern recognition alone is not enough to stop modern attacks. Training on detections teaches models what happened, but not why it mattered.

How to Improve Cyber Security and Phishing Protection with a Fractional Executive

Many organisations today turn to fractional executives - such as a fractional CEO or fractional CFO - to gain fast access to reliable external expertise that improves operations without committing to a full-time hire. Similar solutions exist for specialised cyber security leadership: a fractional CISO can provide strategic oversight, governance, and risk-based decision-making on a flexible basis. For organisations facing ever-more sophisticated threats and limited internal resources, engaging an expert on a fractional basiscan mean the difference between reactive firefighting and proactive cyber resilience.

AI Security in 2026 Starts With Identity #cybersecurity #datasecurity #identitysecurity

As AI adoption grows, identity risk grows with it. Dirk Schrader, VP of Security Research at Netwrix, explains why governing human and machine identities is foundational to securing AI systems. How are you governing identity in your AI workflows today?