Promptlock – The First AI-Powered Malware

Promptlock – The First AI-Powered Malware

Promptlock – The First AI-Powered Malware Find Threat Talks on Promptlock – The First AI-Powered Malware If malware used to be predictable, those days are gone.With AI in the driver’s seat, malware has become a shape-shifter. Promptlock is the first documented...
Data Bouncing: How HTTP Headers Leak Data

Data Bouncing: How HTTP Headers Leak Data

Data Bouncing: How HTTP Headers Leak Data Find Threat Talks on Data Bouncing: How HTTP Headers Leak Data You harden endpoints. You filter egress. You deploy malware detectors. And still, data slips out. In this Threat Talks Deep Dive, our host sits down with Luca...
AI, Play It Safe: Why CISOs Are Wrong to Ban AI

AI, Play It Safe: Why CISOs Are Wrong to Ban AI

AI, Play It Safe: Why CISOs Are Wrong to Ban AI Find Threat Talks on AI, Play It Safe: Why CISOs Are Wrong to Ban AI AI is transforming the way we work and live. From boosting productivity to exposing sensitive data, the technology is reshaping both business and...
Zero Trust Step 5A: Monitor and Maintain

Zero Trust Step 5A: Monitor and Maintain

Zero Trust Step 5A: Monitor and Maintain Find Threat Talks on Zero Trust step 5A: Monitor and Maintain Monitoring is often treated as an afterthought in cybersecurity, or worse, as a starting point. But without the right foundation, all those logs, alerts and SIEM...