These 4 critical AI vulnerabilities are being exploited faster than defenders can respond ...
Google Threat Intelligence Group (GTIG) has published a new report warning about AI model extraction/distillation attacks, in which private-sector firms and researchers use legitimate API access to ...
Google’s Gemini AI is being used by state-backed hackers for phishing, malware development, and large-scale model extraction attempts.
Zast.AI has raised $6 million in funding to secure code through AI agents that identify and validate software vulnerabilities ...
The best defense against prompt injection and other AI attacks is to do some basic engineering, test more, and not rely on AI to protect you. If you want to know what is actually happening in ...
The Model Context Protocol (MCP) has quickly become the open protocol that enables AI agents to connect securely to external tools, databases, and business systems. But this convenience comes with ...
A public preview of SQL Server 2025 adds new vector capabilities already found in rival databases, along with JSON support and change event streaming. Microsoft is moving SQL Server 2025 into public ...
A newly disclosed weakness in Google’s Gemini shows how attackers could exploit routine calendar invitations to influence the model’s behavior, underscoring emerging security risks as enterprises ...
While more and more people are using AI for a variety of purposes, threat actors have already found security flaws that can turn your helpful assistant into their partner in crime without you even ...
From new agentic AI discovery capabilities and automatic discount pricing to the ability for partners to sell pre-packaged, multi-product solutions: here’s five major upgrades to the AWS Marketplace ...
The implications of AI for data governance and security don’t often grab the headlines, but the work of incorporating this ...