What is GenAI Runtime Defense (GARD)?
Blog Published: 11/06/2025
Originally published by TrojAI. As GenAI systems become more complex and their use more widespread, the need to protect them is increasingly urgent. Unfortunately, traditional cybersecurity defenses are not designed to protect AI models, applications, and agents. Traditional cybers...
From Chatbots to Agents: The Evolution Toward Agentic AI
Blog Published: 11/13/2025
Originally published by Aembit. The chatbot that once asked "Press 1 for billing" can now autonomously process your refund, update your account, and schedule a follow-up call. What we're witnessing is the fourth major evolution in AI-human interaction, from rigid rule-following systems to ...
SecretPoint: How OneDrive Auto-Sync Turns SharePoint into a Hidden Secrets Vault
Blog Published: 11/14/2025
Written by Itzik Alvas, Entro Security. One in every five exposed enterprise secrets originated from SharePoint. It wasn’t the result of a zero-day or a sophisticated exploit. Instead, the exposure traced back to something far more ordinary — a default OneDrive auto-sync feature si...
An Overview of the EU Cyber Resiliency Act (EU CRA)
Blog Published: 11/18/2025
Originally published by Schellman. The EU Cyber Resilience Act (CRA) sets a new regulatory benchmark for product cybersecurity, impacting manufacturers, importers, and distributors worldwide. In this article, we’ll explain the Act’s scope, key requirements, and timeline to help...
It's Time to Rethink Cloud Investigations
Blog Published: 12/02/2025
Cloud has changed everything, but investigations haven’t kept up. With breaches hitting cloud data and attackers moving faster than ever, legacy forensics are too slow, too manual, and too fragmented. It’s time for a cloud-first approach: automated, unified, and built for today’s speed of att...
RansomHub Is Gone—But Their ESXi Ransomware Tactics Still Threaten Virtual Infrastructure
Blog Published: 12/09/2025
In 2024, one ransomware group surged to the forefront: RansomHub. Rapidly dominating the ransomware-as-a-service (RaaS) ecosystem, this formidable network successfully breached more than 600 organizations worldwide, targeting sectors from healthcare and finance to critical infrastructure. &n...
Cloud Security Alliance Introduces New Tool for Assessing Agentic Risk
Press Release Published: 11/13/2025
Capabilities-Based Risk Assessment framework measures key autonomous risk factors DALLAS, TX — November 12, 2025 — The Cloud Security Alliance (CSA) today announced the release of its latest research whitepaper, Capabilities-Based Risk Assessment (CBRA), a groundbreaking framework developed b...
It’s Time to Make Cloud Threat Modeling Continuous
Blog Published: 11/20/2025
If you still run threat modeling as a one-time design activity, you’re missing the whole point of the cloud. Modern environments are elastic, multi-account, API-driven, and (thanks to AI) constantly changing. The attack surface is always reshaping itself. CSA’s new Cloud Threat Modeling 2025 ...
Why Your Copilot Needs a Security Co-Pilot: Enhancing GenAI with Deterministic Fixes
Blog Published: 12/10/2025
In 2025, nearly every engineering team is leaning on generative AI tools like GitHub Copilot, Amazon CodeWhisperer, and Claude to accelerate Infrastructure-as-Code. These tools make it faster than ever to spin up Terraform configs or CloudFormation templates, boosting productivity across the...
Introducing OpenPCC
Blog Published: 11/13/2025
As AI becomes more powerful and accessible, the stakes around data privacy and protection are higher than ever. For instance, a single employee, seeking to leverage AI’s ability to read and understand a PDF, can easily upload a confidential document to an LLM and, in doing so, mistakenly ex...
Closing the Cloud Forensics and Incident Response Skills Gap
Blog Published: 12/16/2025
Every alert that goes uninvestigated is a calculated risk — and teams are running out of room for error. Security operations today are stretched thin. SOCs face an overwhelming volume of alerts, and the shift to cloud has only made triage more complex. Research suggests that 23% of clo...
Micro-Segment the Metal: A Zero Trust Field Guide for Physical Hosts
Blog Published: 12/12/2025
Some workloads refuse to live happily inside shared virtualization. Regulated databases still insist on hardware-bound licensing. Ultra-low-latency trading engines want their own lanes. GPU training boxes choke on noisy neighbors. The common reflex is to wall these off with bigger VLANs and...
Understanding the DoD’s New Cyber Security Risk Management Construct (CSRMC)
Blog Published: 12/15/2025
If the Pentagon is throwing out the old playbook with its new Cyber Security Risk Management Construct (CSRMC), it’s because the previous process never quite matched operational reality — bogged down by static checklists and paperwork that left systems vulnerable and slow to secure. But her...
Beyond Workday: Why Socially Engineered SaaS Breaches Are Spreading
Blog Published: 12/15/2025
Cybersecurity headlines often highlight stolen databases, ransomware demands, or nation-state exploits. The recent security breach at Workday, however, shows how attackers are evolving in quieter, subtler ways. Hackers didn’t smash through a firewall or exploit a zero-day; they relied on pers...
Prepare for Q-Day with Hybrid Mode Key Exchange
Blog Published: 11/17/2025
“Store Now, Decrypt Later," or SNDL, attacks are a unique brand of attack that you need to keep top-of-mind in the coming years. Our new publication, A Practitioner’s Guide to Post-Quantum Cryptography, lays out why SNDL is so different. Exploitation may start today and only completes...
Red Teaming Voice AI: Securing the Next Generation of Conversational Systems
Blog Published: 11/20/2025
Originally published by TrojAI. The new security blind spot Voice-driven AI is moving quickly from science fiction to daily reality as we move from GenAI models to more sophisticated applications and agents. Once relegated to smart speakers and novelty gadgets, voice AI now drives ...
Securing Application-to-Application Traffic with AI/AGI/ML-Powered Virtual Firewalls: A Comprehensive Framework for Multi-Cloud, Hybrid, and On-Premises Environments
Blog Published: 11/21/2025
Written by Sunil Gentyala, Lead Cybersecurity & AI Security Engineer, HCLTech. Abstract The proliferation of distributed applications across public cloud, hybrid cloud, private cloud, and on-premises infrastructure necessitates advanced security mechanisms to protect inte...
Implementing CCM: Threat & Vulnerability Management Controls
Blog Published: 11/21/2025
The Cloud Controls Matrix (CCM) is a framework of controls that are essential for cloud computing security. Created by CSA, the CCM aligns with CSA best practices. You can use CCM to assess and guide the security of any cloud service. CCM also provides guidance on which actors within the clo...
Microsoft Entra ID Vulnerability: The Discovery That Shook Identity Security
Blog Published: 12/08/2025
In July 2025, the cybersecurity world was rocked by security researcher Dirk-jan Mollema’s unveiling of a catastrophic vulnerability within Microsoft Entra ID. This was no ordinary flaw; it was a fundamental breach that shattered tenant isolation and obliterated the core trust boundaries esse...
Executive Briefing: Hypervisor Ransomware—The Hidden $400 Million Board-Level Exposure
Blog Published: 12/19/2025
Originally published by Vali Cyber. Why Leadership Must Pay Attention As hypervisor attacks surge and exposure widens, this once-overlooked layer now poses material risk to revenue, operations, and oversight. Ransomware on VMware ESXi has tripled YoY. Attackers have shifted to the...