This week, Ledger flagged physical attack risks to Android hot wallets, a 700M euro fraud network was dismantled, a suspect in the $243M Genesis theft was reportedly detained and a member of a $263M crypto scam pleaded guilty. Two men arrested in a Vienna crypto-linked killing.
With $200 million in Series E funding and a new $5.5 billion valuation, Harness will scale its AI-powered platform for security, compliance and reliability in software development. The investment will support R&D into AI agents, testing, cost optimization and security for AI workloads.
New York City gets a new mayor on Jan. 1, and while no one knows Zohran Mamdani's plans for using artificial intelligence, the city's AI Action Plan will ensure a strong foundation for innovation, city Chief Technology Officer Matthew Fraser told attendees at The AI Summit in Manhattan on Wednesday.
Threat detection systems have traditionally aggregated telemetry into a single repository, but that model can no longer keep pace with the scale, cost and diversity of enterprise security data, said Eli Rozen, co-founder and CTO at Vega.
BNY is integrating Google Cloud's Gemini Enterprise agentic artificial intelligence platform into its proprietary enterprise AI platform, Eliza. The move represents an evolution from AI as a pilot project to AI as infrastructure for the global financial services organization.
AI-based attacks will come faster and the sequence of activities will be less predictable. Cyber defenders are skilled in network analysis, incident response and cloud or identity management, but in the face of AI-based attacks, they need new skills, tools and defensive tactics.
AI-generated code expands the attack surface as attackers use autonomous agents to find and exploit flaws in hours. Snir Havdala, co-founder and chief product officer at Zafran Security, said attackers build specialized agents that handle reconnaissance, exploitation and rapid adaptation.
With a $36 million investment, Clover Security plans to expand its suite of AI agents that automate security reviews and improve collaboration with developers. The company says this proactive approach helps manage risks introduced by AI-driven software creation.
Accurate data and operational context are essential for security teams to identify root causes and deploy effective fixes in cloud environments, says Gil Geron, co-founder and CEO, Orca Security. He explains how AI-driven insights can bridge longstanding gaps between security and engineering teams.
Google faces a fresh probe into its competitive practices after the European Union said it will investigate the search engine giant's propensity to convert web content into fuel for its artificial intelligence models. The commission said the investigation is a "matter of priority."
Google patched a vulnerability in Gemini Enterprise that allowed attackers to steal corporate data through a shared document, calendar invitation or email without any user action or security alerts. No malware was executed, no credentials were phished and no data left through approved channels.
An alleged smuggling ring illegally sold at least $160 million in advanced Nvidia artificial intelligence chips to China, U.S. federal prosecutors said Monday while announcing charges against found individuals. U.S. President Donald Trump also said that day he approved H200 chip sales to China.
Checkmarx acquired AI security startup Tromzo to jumpstart its roadmap for agentic application security. The deal gives Checkmarx a ready-built platform and team focused on enterprise-grade triage and remediation agents designed to streamline vulnerability management.
Artificial intelligence agents are poised to take on major roles in security operations centers, but SOC teams can't just layer autonomous agents onto legacy architectures - they need to reimagine the whole program, said Daniel Bernard, chief business officer at CrowdStrike.
AI agents promise faster incident response, but enterprise teams need reliability and accuracy before granting autonomy, says Michael Whetten, senior vice president of product at Datadog. The journey from copilot to autonomous operations requires rigorous evaluation and customer feedback loops.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.