Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Are we only one prompt away from using AI for evil? #cybersecurity #ai #infosec

Are we only one prompt away from using AI for evil? In this week's episode of The Cybersecurity Defenders Podcast, we explore a concerning reality about AI and cybersecurity. As AI becomes more prevalent within the threat actor community, exploits are being developed faster than humans can patch. The tools that help developers debug code can just as easily be used to weaponize vulnerabilities.

CVE-2025-6515 Prompt Hijacking Attack - How Session Hijacking Affects MCP Ecosystems

JFrog Security Research recently discovered and disclosed multiple CVEs in oatpp-mcp – the Oat++ framework’s implementation of Anthropic’s Model Context Protocol (MCP) standard. Among these, CVE-2025-6515 stood out due to its potential threat of hijacking MCP session IDs. Within the context of MCP we’ve dubbed this new attack technique “Prompt Hijacking“. Your browser does not support the video tag.

AI at Work: How Egnyte Intelligence Goes Beyond Generic Tools

AI isn’t the future, it’s here. Your CEO’s talking about it in board meetings. Your manager wants to know if it'll save time or just add more work. And you? You're wondering if it's going to make your job easier or just add noise. The excitement is justified. McKinsey says nearly 80% of companies are using AI somewhere in their business. But here's what most people miss: very few have gotten it to work across their entire organization. Why?

Zenity Labs & MITRE ATLAS Collaborate to Advance AI Agent Security with the First Release of Agent-Focused TTPs

Zenity Labs worked in collaboration with MITRE ATLAS to incorporate the first 14 agent-focused techniques and subtechniques, extending the framework beyond LLM threats to cover the unique risks posed by AI agents.

Cloud Security Tips for Companies

Cloud computing is now central to company operations, but it can also be an opportunity for hackers. As of late last year, 80% of organizations experienced more frequent cloud attacks. Strengthening security is essential. Clear, actionable cloud security tips help protect digital assets with minimal complexity. As companies migrate more services and data to cloud environments, risks grow and become harder to detect.

Under The Light: ExPRT.AI

n this episode of Under the Light, we take a closer look at ExPRT.AI—CrowdStrike’s approach to vulnerability prioritization that cuts through the noise. You’ll see how ExPRT.AI moves beyond static scoring models like CVSS, EPSS, and KEV by asking a better question: Will this vulnerability actually be exploited? We’ll break down: The three signals attackers rely on—and so does ExPRT.AI What makes a vulnerability worth their time A real-world story from Intermex that shows what this looks like in action And how all of it comes to life inside the Falcon platform.

Founder Personal Branding Using Code: How to Use GitHub, Open-Source, and Technical Content to Drive Business Leads

Today, founders are no longer just business leaders-they're public figures, content creators, and community builders. For technical founders especially, code isn't just for building products. It's a powerful tool for building personal brands that drive leads, grow networks, and attract real business opportunities. Whether it's through GitHub contributions, open-source projects, or technical blog posts, founders can showcase their expertise while creating long-lasting value for their business.

AI Software Development Solutions: 7 Key Trends to Watch

Artificial intelligence isn't just a buzzword anymore-it's a game-changer. From startups to large enterprises, AI software development solutions are reshaping the way companies operate, innovate, and connect with customers. Imagine having a system that can analyze millions of data points in seconds, predict trends before they happen, or even draft content for marketing campaigns automatically. That's the power AI brings to the table.

How to View Comments on Instagram Posts from a Private Account?

Are you wondering how to view comments on Instagram posts from your exes, lover(s), children, business competitors, co-workers, or estranged family members without an Instagram account? You are in the right place. Whatever motivations you have for wanting to stay anonymous or seek out this information, we don't judge.