Aggregator
Браузер сам покупает Apple Watch и сливает ваши пароли. А вы и дальше доверяйте ИИ
Threat Actors Weaponize PDF Editor With New Torjan to Turn Device Into Proxy
Cybersecurity researchers have uncovered a sophisticated new threat campaign that leverages a seemingly legitimate PDF editor application to transform infected devices into residential proxies. The malicious software, distributed under the guise of productivity tools, represents an evolving approach by threat actors who are increasingly exploiting trusted software categories to establish persistent network access and monetize […]
The post Threat Actors Weaponize PDF Editor With New Torjan to Turn Device Into Proxy appeared first on Cyber Security News.
Kali Vagrant Rebuilt Released – Pre-configured DebOS VMs via Command Line
The Kali Linux team has announced a significant enhancement of its Vagrant image build process, streamlining development and simplifying deployment for users. In a move to unify its infrastructure, the team has transitioned from HashiCorp’s Packer to DebOS for generating its pre-configured Vagrant virtual machines. The release also includes a handy cheat sheet to get […]
The post Kali Vagrant Rebuilt Released – Pre-configured DebOS VMs via Command Line appeared first on Cyber Security News.
GPT-5 прошёл тест на пространственное мышление. Результат удивил даже учёных
7 Phishing Email Examples (And How To Spot Them)
Cybercriminals commonly target K-12 schools. To trick staff, students, and even parents into disclosing sensitive information, malicious attackers deploy phishing attacks. Training individuals on how to spot phishing emails is a key guardrail and can prevent significant financial, operational, and regulatory repercussions. Read on as we unpack seven common phishing email examples and the steps ...
The post 7 Phishing Email Examples (And How To Spot Them) appeared first on ManagedMethods Cybersecurity, Safety & Compliance for K-12.
The post 7 Phishing Email Examples (And How To Spot Them) appeared first on Security Boulevard.
FBI warns of Russian hackers exploiting 7-year-old Cisco flaw
一次找书的趣味挑战
Why AI Agents and MCP Servers Just Became a CISO’s Most Urgent Priority
Over the last year, I’ve spent countless hours with CISOs, CTOs, and security architects talking about a new wave of technology that’s changing the game faster than anything we’ve seen before: Agentic AI and Model Context Protocol (MCP) servers.
If you think AI is still in the “cool demos and pilot projects” stage, think again. We’re already seeing autonomous agents reasoning, remembering, and taking actions in live production environments. MCP servers are quietly becoming the central nervous system for these agents, brokering instructions, accessing tools, and orchestrating API calls across your systems.
This is no longer an “emerging tech” conversation. It’s a real risk surface conversation. And it’s all powered by APIs.
Why APIs Are Now the Front LineEvery AI agent and MCP server interaction runs on APIs. Those APIs pull data from customer records, update transaction systems, initiate workflows, and often do so without a human in the loop.
Here’s the problem:
- Most current security tooling, like WAFs, API gateways, CDNs, and LLM security wrappers can’t see all of this API traffic.
- The API calls between an MCP server and your internal or third-party data sources often happen deep inside your environment, bypassing the “edge” where traditional tools sit.
- Many of these APIs are new, undocumented, or dynamic, created on the fly as agents take new actions.
Without real-time visibility into this API fabric, you’re blind to:
- What data agents are accessing
- Whether they’re staying within policy
- If an attacker has hijacked an agent or exploited an API to breach your system
For CISOs, this is a perfect storm: a technology that’s moving faster than your governance frameworks, with attack surfaces multiplying overnight, all in a domain (APIs) where most organizations already struggle to get full visibility.
The “just secure the AI model” approach doesn’t work here. The model isn’t the thing taking actions; the APIs are. If you don’t secure them, you don’t secure the AI. Period.
The 5 Questions Every CISO Should Be Asking Right NowWhen I meet with CISOs today, these are the five questions I tell them to put on the table immediately:
- Do we have an accurate, up-to-date inventory of every API our AI agents and MCP servers are using? If you don’t know what you have, you can’t protect it.
- Can we see API traffic between our MCP servers, AI agents, and all internal/third-party data sources in real time? Edge-only visibility isn’t enough. You need to see the whole API fabric.
- Are our governance and policy controls applied at the API level for AI-driven actions? An AI agent can violate policy just as easily as a human, maybe faster.
- Do we have threat detection tuned for AI-driven API attacks and abuse patterns? This is not “just another OWASP Top 10” problem. Agentic AI creates new classes of attacks.
- How fast can we identify and stop a rogue agent or compromised MCP server before it impacts data or systems? Containment speed is everything once something goes wrong.
At Salt, we’ve been securing APIs since before “API security” was even a market category. Our platform gives you:
- Complete visibility into all API traffic, including the traffic no other tool sees between MCP servers, AI agents, and data sources.
- Continuous discovery so you’re never blindsided by a new or shadow API.
- Real-time threat detection and blocking built for modern API abuse patterns, including those driven by AI agents.
- Governance at scale, so your policies follow the API, no matter how dynamic your environment gets.
If Agentic AI is your new competitive advantage, API security is your new survival strategy. You can’t slow the technology down, but you can be ready for it.
Final ThoughtAgentic AI and MCP servers are reshaping the attack surface, whether we like it or not. The organizations that thrive in this new reality will be the ones that treat API security as core infrastructure and not an afterthought. If you’re not already asking the five questions above, now is the time to start.
If your team is exploring agentic AI and wants to talk about securing the foundation it runs on, let’s connect. Request a demo now, and I’ll have one of our AI security experts reach out to you directly.
Also, we are hosting a webinar on August 28 to explore these topics in more depth. You can register for the webinar here.
The post Why AI Agents and MCP Servers Just Became a CISO’s Most Urgent Priority appeared first on Security Boulevard.
索尼上调美国 PS5 游戏机售价 50 美元
CISA Releases Three Industrial Control Systems Advisories
CISA released three Industrial Control Systems (ICS) advisories on August 21, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-233-01 Mitsubishi Electric Corporation MELSEC iQ-F Series CPU Module
- ICSA-25-177-01 Mitsubishi Electric Air Conditioning Systems (Update A)
- ICSMA-25-233-01 FUJIFILM Healthcare Americas Synapse Mobility
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2025-43300 Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability
This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
New Technique for Measuring DNA Damage Could Improve Cancer Therapy and Radiological Emergency Response
Answering Your Webinar Questions: What Do Most IT Teams Get Wrong About DMARC?
Originally published at Answering Your Webinar Questions: What Do Most IT Teams Get Wrong About DMARC? by Levon Vardumyan.
Our recent webinar, “What Do Most IT Teams ...
The post Answering Your Webinar Questions: What Do Most IT Teams Get Wrong About DMARC? appeared first on EasyDMARC.
The post Answering Your Webinar Questions: What Do Most IT Teams Get Wrong About DMARC? appeared first on Security Boulevard.
Google 宣布 Pixel 10 系列手机
How to Automate Your Penetration Testing?
Learn how to automate your penetration testing, save time, reduce costs, and achieve business logic testing without human-in-the-loop.
The post How to Automate Your Penetration Testing? appeared first on Security Boulevard.
New SHAMOS Malware Targets macOS Through Fake Help Sites to Steal Login Credentials
Cybersecurity researchers at CrowdStrike identified and thwarted a sophisticated malware campaign deploying SHAMOS, an advanced variant of the Atomic macOS Stealer (AMOS) malware, orchestrated by the cybercriminal group COOKIE SPIDER. Operating under a malware-as-a-service model, COOKIE SPIDER rents out this information stealer to affiliates who target victims to harvest sensitive data, including login credentials, cryptocurrency […]
The post New SHAMOS Malware Targets macOS Through Fake Help Sites to Steal Login Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.