Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hunting the Unknown: How AI-Powered Analytics Are Redefining Cyber Threat Detection

Cybersecurity is in an arms race — attackers are using AI to launch deepfake fraud, polymorphic malware, and insider-driven threats at scale. But AI is also rewriting the rules for defenders. In this webinar, Sheik Abideen (Regional Sales Director, MEA) and Zubair Mukhtar Chowgale (Manager, Sales Engineering, APMEA) reveal how Securonix Unified Defense SIEM powered by Agentic AI helps overwhelmed SOC teams transform into proactive threat hunters.

59 Generative AI Statistics to Know in 2025

Over the past few years, generative AI has moved from research labs into mainstream industries, reshaping how people interact with technology. Advances in deep learning, especially transformer models, allowed systems like ChatGPT and Stable Diffusion to generate human-like text and realistic images. These breakthroughs sparked widespread interest because they showed that AI could create content, making it useful in writing, design, and coding.

Fireside Chat | Adapting Security Leadership for the Age of AI

Erika Carrara, VP & Chief Information Security & Infrastructure Officer at The Greenbrier Companies, shares how she’s adapting her security strategy to meet the demands of the AI era by modernising her tech stack, implementing AI governance, and embedding security into business culture. Interested in finding out more about UpGuard?

7 Cybersecurity Concerns Related to The MCP Protocol

Everyone’s trying to make AI agents do useful things. That’s why the Model Context Protocol (MCP) is gaining momentum with teams operationalizing LLMs across their infrastructure and tooling. Backed by teams like OpenAI and Google, MCP gives a consistent, standardized way to connect LLMs with the rest of your stack. In other words, the MCP Protocol makes connecting AI tools with real business data and workflows easier using structured access instead of janky UI hacks and glued-on custom code.

Nx npm Malware Explained: AI Agent Hijacking

Nx npm malware (Aug 2025): attackers published malicious Nx packages that weaponized AI coding agents (Claude Code, Gemini CLI, Amazon Q) via a postinstall script to inventory sensitive files and exfiltrate sensitive data to public GitHub repos named “s1ngularity-repository-*.” We break down what happened, affected versions, and how to check + respond (rotate credentials, hunt IoCs, and more). Resources.

Mobile App Authentication Best Practices: MASVS-AUTH Compliance Guide

In our increasingly interconnected world, mobile applications have become indispensable tools for accessing a vast array of services and sensitive data. This post provides an in-depth exploration of mobile application authentication, grounded in the OWASP Mobile Application Security Verification Standard (MASVS), with a particular focus on MASVS-AUTH.

Optimizing the SOC: Leveraging AI and automation for modern threats

The Security Operations Center (SOC) is the nerve center of an organization's defenses, but its efficiency and effectiveness are often limited by the growing volume and complexity of threats. By leveraging AI-driven threat detection and automated incident response, security leaders can optimize their SOC to respond faster and smarter. For CISOs, this means not only protecting the organization from current threats but also future-proofing defenses against an increasingly sophisticated threat landscape.