Open-source AI pentesting tools are getting uncomfortably good

AI has come a long way in the pentesting world. We are now seeing open-source tools that can genuinely mimic how a human tester works, not just fire off scans. I dug into three of them, BugTrace-AI, Shannon, and CAI, the Cybersecurity AI framework, and… Continue reading Open-source AI pentesting tools are getting uncomfortably good

Where NSA zero trust guidance aligns with enterprise reality

The NSA has published Phase One and Phase Two of its Zero Trust Implementation Guidelines, providing structured guidance for organizations working to implement zero trust cybersecurity practices. The documents are part of a larger series designed to su… Continue reading Where NSA zero trust guidance aligns with enterprise reality

Pompelmi: Open-source secure file upload scanning for Node.js

Software teams building services in JavaScript are adding more layers of defense to handle untrusted file uploads. An open-source project called Pompelmi aims to insert malware scanning and policy checks directly into Node.js applications before files … Continue reading Pompelmi: Open-source secure file upload scanning for Node.js

What boards need to hear about cyber risk, and what they don’t

In this Help Net Security video, Rishi Kaushal, CIO at Entrust, explains how security leaders should talk to the board about cyber risk. He focuses on what matters to board members and what does not. He links cryptography, certificates, and authenticat… Continue reading What boards need to hear about cyber risk, and what they don’t

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors compromised a legitimate developer’s resources to push malicious updates to downstream users.
“On January 30, … Continue reading Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

Posted in Uncategorized

AI is flooding IAM systems with new identities

Most organizations view AI identities through the same lens used for other non-human identities, such as service accounts, API keys, and chatbots, according to The State of Non-Human Identity and AI Security report by the Cloud Security Alliance. AI id… Continue reading AI is flooding IAM systems with new identities