Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Custom Fonts Can Trick AI Assistants Into Approving Phishing Sites

Researchers at LayerX warn that custom fonts can fool AI web assistants into thinking phishing pages are benign, while the human user sees something completely different. “There is a structural disconnect between what an AI assistant analyzes in a page’s HTML and what a user sees rendered by the browser,” the researchers explain.

RSA 2026: Leading the way to secure agentic AI

Every year, security and tech leaders come to the RSA conference in San Francisco to take the industry’s pulse, and every RSAC tends to be dominated by a single, overarching theme. Last year, the theme was: “AI agents are coming, and governance isn’t ready.” And sure enough, the theme of RSAC 2026 was: “AI agents are here, and governance needs to catch up.”

Trivy/LiteLLM Breach: How to Identify Your Exposure and Contain It - 20-min Live Demo

In this 20-minute live demo with Eric Fourrier (CEO and Founder of GitGuardian), Guillaume Valadon (Staff Cybersecurity Researcher at GitGuardian), & Dwayne McDaniel (Principal Developer Advocate at GitGuardian), you'll see how to determine if your machines were compromised by the ongoing Trivy and LiteLLM supply chain attack (attributed to TeamPCP), then scan for exposed secrets and get moving on remediation - step by step.

The Deep Dive | Seamlessly Manage your Organization's Credentials with JumpCloud Vault 03.27.2026

Empower your team with secure password management and modern privileged access Management. Learn how JumpCloud Vault strengthen's your security posture and manages the entire lifecycle of your organisation's credentials.

RSA 2026: The Shift Toward Security FOR AI

RSA Conference 2026 made one thing clear very quickly. Security leaders are done with generic AI pitches. After two years of relentless “AI everything,” the market is now pushing back. There is a growing fatigue with vague promises, surface-level features, and what many are calling outright AI washing. The result is a trust gap. What cut through this year was not another AI-powered detection claim. It was a much more grounded question.

How Adaptive Email Security Helps Navigate Threats in the Age of AI

A finance employee receives an email that appears to come from the CFO requesting urgent payment approval. The message references a current project, uses the correct tone, and arrives at a plausible time. However, the email wasn’t written by a colleague — it was generated by AI. And it contains a malicious link. These attacks are becoming more common as threat actors use AI to produce convincing phishing emails, automate impersonation attempts, and launch social engineering campaigns at scale.

The Emerging Security Risks of Agentic AI

AI is moving fast. But the transition from GenAI tools that respond to prompts to AI agents that execute workflows represents something qualitatively different for security leaders. The shift goes beyond just scale, and is a fundamental change in how data moves, who touches it, and what decisions get made, often without human review.

How AI Dash Cams are Revolutionizing Fleet Safety in 2026

Road safety has changed a lot in the last few years. Trucks and vans now carry smart sensors that watch the road better than humans. This shift protects drivers and other people on the street. Managers can see what is happening in the cab and on the street at the same time - this new tech keeps drivers safe. It provides a clear view of daily operations. The data helps businesses save money and stay on schedule.

How to Gain Value from AI in Cybersecurity

The Terminator is often people’s reference point for artificial intelligence (AI), especially when they worry that technology will be the end of civilization. However, on the other end of the AI spectrum is the beloved, marshmallow fluff Baymax, the helper robot providing assistance to those in his presence. The reality of AI sits somewhere between these two extremes. For security teams, AI initially seemed like a revolutionary technology that would offer faster detection and automated analysis.