AUSTIN, Texas —In response to increasing drone threats, Athena Security has developed a drone defense system, the newly unveiled Drone Defense Detection Model. Integrated into the company’s AI ...
API keys and credentials. Agents operate inside authorized permissions where firewalls can't see. Traditional security models ...
This week a reader sent me a story about a CVE in Notepad++, and something isn’t quite right. The story is a DLL hijack, a technique where a legitimate program’s Dynamic Link Library (DLL) is replaced ...
“GPU Confidential Computing (GPU-CC) was introduced as part of the NVIDIA Hopper Architecture, extending the trust boundary beyond traditional CPU-based confidential computing. This innovation enables ...
AI changed attacker economics. Recent Harvard research shows AI can fool over 50% of humans while cutting attack costs by 95% and increasing profitability up to 50-fold. Defender capabilities haven't ...
Most API vulnerabilities are fast, remote, and easy to exploit. Attackers take full advantage of these attributes.
Many teams are approaching agentic AI with a mixture of interest and unease. Senior leaders see clear potential for efficiency and scale. Builders see an opportunity to remove friction from repetitive ...
Anthropic's Opus 4.6 system card breaks out prompt injection attack success rates by surface, attempt count, and safeguard ...
From data poisoning to prompt injection, threats against enterprise AI applications and foundations are beginning to move from theory to reality. Attacks against AI systems and infrastructure are ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results