AI-Native Security Is a Must to Counter AI-Based Attacks
Attacks by artificial intelligence agents are a reality. Experts at Nvidia’s GTC conference say defenders need to use the same tools to fight them off.
Attacks by artificial intelligence agents are a reality. Experts at Nvidia’s GTC conference say defenders need to use the same tools to fight them off.
Google baut Stitch zum KI-Design-Editor aus: Nutzer beschreiben Oberflächen per Sprache oder Text, die KI generiert daraus interaktive Prototypen.
Acht Tage lang bombardierten DDoS-Angreifer 2025 ein Ziel ohne Pause, der längste Angriff, den Link11 jemals dokumentierte. Im selben Jahr standen an 88 Prozent der Tage Unternehmen durch DDoS-Angriffe unter Beschuss. Was früher die Ausnahme war, ist heute der Regelbetrieb: Terabit-Attacken über Tage hinweg zwingen zum Umdenken in der DDoS-Abwehr.
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-Adresse geschuetzt This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities […]
Four former NSA chiefs representing a near-complete history of US Cyber Command debate the role of offensive cyber in the government at RSAC.
Es hat offenbar ein Angriff auf die Open-Source-Bibliothek zur Anbindung an LLMs stattgefunden, wodurch zwei kompromittierte Pakete Credentials stehlen können.
A telemetry pipeline has become a core layer in modern security operations because teams no longer send data from applications, infrastructure, and cloud services straight into a single backend and hope for the best. In 2026, most environments are distributed across cloud, hybrid, and on-prem systems, which means more services, more data sources, more formats, […]
Mit Lakewatch präsentiert Databricks ein offenes SIEM auf Lakehouse-Basis. KI-Agenten sollen Bedrohungen in Datenpools automatisch erkennen und triagieren.
Die Linux-Distribution für Sicherheitsforscher Kali Linux 2026.1 ist erschienen. Sie bringt neue Tools mit und zollt Tribut für den Vorgänger BackTrack Linux.
Romania Under DDoS Attacks: Weekly DDoS Threat Intelligence Analysis Analysis Period: March 17 – 23, 2026 Between March 17 and 23, 2026, SOCRadar identified an extensive coordinated DDoS campaign conducted by the pro-Russian threat actor NoName057(16) using their DDoSia attack tool. The campaign resulted in 13,716 recorded attack entries, targeting 148 unique domains and 134 […]