Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A January Snapshot: Real-World AI Usage

AI is no longer a fringe productivity experiment inside organisations, it is embedded, habitual, and increasingly invisible. This snapshot from CultureAI’s January usage data highlights how AI is actually being used across everyday workflows, and where risk is forming as a result. Rather than focusing on hypothetical threats or model-level concerns, the findings below surface behavioural signals from real interactions: prompts, file uploads, and context accumulation.

How do AI guardrails protect infrastructure from the unsafe and unpredictable territory of LLM risks

How do AI guardrails protect infrastructure from the unsafe and unpredictable territory of LLM risks? An AI firewall or guardrail device sits between your applications and large language models to keep the data sent and received from LLMs safe, compliant, and high-quality. Its design is to inspect natural-language traffic and protect your infrastructure against LMM vulnerabilities, including prompt injection, jailbreak attacks, data poisoning, system prompt leakage, and OWASP Top 10 vulnerabilities, using advanced, proprietary reasoning models.

Using SSL Inspection and AI Guardrails to Protect Infrastructure

Using SSL Inspection and AI Guardrails to Protect Infrastructure How do you protect your AI infrastructure from threats without impacting user experience? In this video, we'll cover the methods organizations can use to inspect encrypted traffic, including what is sent to AI chatbots, and add guardrails to protect against security risks. We'll cover.

0-Click RCE in Claude Desktop: How AI Extensions Threaten Endpoint Security

The modern enterprise software ecosystem increasingly relies on desktop AI applications enhanced through extensible plugin or extension frameworks. These extensions are designed to improve productivity by enabling integrations with local files, browsers, APIs, developer tools, and internal systems. However, this same extensibility introduces a high-risk attack surface when extension permissions, sandboxing, and input validation are weakly enforced.

Exabeam Agent Behavior Analytics: First-of-Its-Kind Behavioral Detections for AI Agents

AI agents are moving into real workflows faster than most teams expected. According to PwC’s 2025 AI Agent Survey, 79% of companies are already adopting AI agents, and 88% of executives expect to increase AI-related budgets in the next year. These agents are now handling research, summarization, customer engagement, and operational tasks at a scale humans can’t match.

AI Agent-to-Agent Communication: The Next Major Attack Surface

We are witnessing the end of the "Human-in-the-Loop" era and the beginning of the "Agent-to-Agent" economy. Until recently, most AI interactions were hub-and-spoke models where a human user prompted a central model, reviewed the output, and then took action. That model provided a natural safety brake. If the AI hallucinated or suggested a malicious action, a human was there to catch it. That safety brake is disappearing.

How MCP Servers Can Propagate Prompt Injection #mcp #promptinjection #aisecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Find user activity across endpoints with Claude Code #cybersecurity #ai #securityoperations

Watch Claude Code query LimaCharlie telemetry to locate user activity across all endpoints in an organization. The agent correlates events across process execution, login sessions, and network connections to identify the most recent user activity and establish behavioral patterns. Security analysts can investigate user presence without manually searching through telemetry streams.

PHISHING GOT 10X FASTER WITH AI #apisecurity #phishing #aisecurity #DevSecOps #applicationsecurity

PHISHING GOT 10X FASTER Phishing attacks sped up 10x thanks to AI what took weeks is now compressed to hours. Vulnerabilities are discovered continuously and scaled instantly Attacks became adaptive and contextual for 2025 cybersecurity In this short clip from our webinar, we break down why this is the new reality.