Top 25 MCP Vulnerabilities Reveal How AI Agents Can Be Exploited

A new ranking of Model Context Protocol weaknesses highlights critical risks—from prompt injection to command injection—and provides a roadmap for securing the foundations of agentic AI.
The post Top 25 MCP Vulnerabilities Reveal How AI Agents Can Be E… Continue reading Top 25 MCP Vulnerabilities Reveal How AI Agents Can Be Exploited

Ray Security Emerges From Stealth With $11M to Bring Real-Time, AI-Driven Data Protection

Tel Aviv, Israel-based Ray Security emerged from stealth with $11 million seed funding and a desire to change the way corporate data is protected. The funding was co-led by Venture Guides and Ibex Investors.
The post Ray Security Emerges From Stealth W… Continue reading Ray Security Emerges From Stealth With $11M to Bring Real-Time, AI-Driven Data Protection

Neon Cyber Emerges from Stealth, Shining a Light into the Browser

Neon Cyber argues that phishing, social engineering, and insider threats demand protections that follow users into the browser, where most attacks now begin.
The post Neon Cyber Emerges from Stealth, Shining a Light into the Browser appeared first on S… Continue reading Neon Cyber Emerges from Stealth, Shining a Light into the Browser

Zero Trust Is 15 Years Old — Why Full Adoption Is Worth the Struggle

Fifteen years after its debut, Zero Trust remains the gold standard in cybersecurity theory — but its uneven implementation leaves organizations both stronger and dangerously exposed.
The post Zero Trust Is 15 Years Old — Why Full Adoption Is Worth the… Continue reading Zero Trust Is 15 Years Old — Why Full Adoption Is Worth the Struggle

UAE’s K2 Think AI Jailbroken Through Its Own Transparency Features

Researchers exploited K2 Think’s built-in explainability to dismantle its safety guardrails, raising new questions about whether transparency and security in AI can truly coexist.
The post UAE’s K2 Think AI Jailbroken Through Its Own Transparency Featu… Continue reading UAE’s K2 Think AI Jailbroken Through Its Own Transparency Features

AI Emerges as the Hope—and Risk—for Overloaded SOCs

With security teams drowning in alerts, many suppress detection rules and accept hidden risks. AI promises relief through automation and triage—but without human oversight, it risks becoming part of the problem.
The post AI Emerges as the Hope—and Risk… Continue reading AI Emerges as the Hope—and Risk—for Overloaded SOCs

Hush Security Emerges Stealth to Eliminate Credential Threats With No-Secrets Platform

Tel Aviv–based startup replaces vaults and secrets managers with just-in-time policies, aiming to eliminate credentials entirely.
The post Hush Security Emerges Stealth to Eliminate Credential Threats With No-Secrets Platform appeared first on Security… Continue reading Hush Security Emerges Stealth to Eliminate Credential Threats With No-Secrets Platform

Ransomware Losses Climb as AI Pushes Phishing to New Heights

Based on real-world insurance claims, Resilience’s midyear report shows vendor risk is declining but costly, ransomware is evolving with triple extortion, and social engineering attacks are accelerating through AI.
The post Ransomware Losses Climb as A… Continue reading Ransomware Losses Climb as AI Pushes Phishing to New Heights