🎙️ We welcome Gee Rittenhouse, VP of Security at Amazon Web Services (AWS), to the show to discuss the complexities of multi-stage attacks in cybersecurity, how these attacks unfold, and the evolving role of AI in both enhancing security and creating new vulnerabilities. https://lnkd.in/efwN_Rdh
More Relevant Posts
-
How is AI redefining cyber risk across domains? On April 9, leaders from Amazon Web Services (AWS), CrowdStrike, Okta, Rubrik and Zscaler will come together in Chicago to share practical insights and real-world examples of identity-centric defenses in action. Stay after the panel to continue the conversation and network with fellow security professionals: https://carah.io/98fea
To view or add a comment, sign in
-
-
Crowdstrike's 2026 Global Threat Report is out. Get your copy! "...trends show how modern adversaries operate: gain legitimate access through identity, move rapidly through cloud and edge infrastructure, and weaponize vulnerabilities before defenders can respond. Speed, legitimacy, and low-visibility access paths now define evasive tradecraft." https://lnkd.in/gxpDuAwh #Cybersecurity #AI #Crowdstrike #CISO
To view or add a comment, sign in
-
Attended the Cybersecurity Forecast 2026 session by Google Cloud Security. Key takeaways: • AI is transforming both attacks and defenses • Cybercrime continues to evolve rapidly • Nation-state cyber operations remain a major concern Excited to keep learning and exploring the future of cybersecurity. #CyberSecurity #GoogleCloud #CyberTrends
To view or add a comment, sign in
-
-
LiteLLM, a widely used AI integration library, has been compromised in a supply-chain attack in which malicious PyPI packages injected credential-stealing malware, exposing cloud credentials, API keys, and sensitive environment data across developer and CI/CD environments. To know more, read our full newsletter: https://lnkd.in/gRnQgPMM #CyberSecurity #SupplyChainAttack #AIsecurity #CloudSecurity #TPRM #CyberThreat #InformationSecurity
To view or add a comment, sign in
-
-
Token Security researcher Ariel Simon will present his findings on the "MCPwned" vulnerability at the RSAC 2026 Conference. The research highlights a remote code execution flaw in Microsoft's Azure MCP server that could allow attackers to compromise Azure tenants. Simon will discuss how this vulnerability exposes new attack surfaces and provide recommendations for securely deploying MCP servers. Read more: https://lnkd.in/gNGuRXmu 📰 Subscribe to the weekly Cybersecurity AI Newsletter: https://lnkd.in/eRwuERfW #ai #artificialintelligence #ainews #cybersecurity #cybersec #cybersecurityai
To view or add a comment, sign in
-
-
APT41 isn’t just another threat actor — it’s a 𝗽𝗲𝗿𝘀𝗶𝘀𝘁𝗲𝗻𝘁 𝗿𝗶𝘀𝗸 𝘁𝗼 𝗲𝗻𝘁𝗲𝗿𝗽𝗿𝗶𝘀𝗲 𝗮𝘁𝘁𝗮𝗰𝗸 𝘀𝘂𝗿𝗳𝗮𝗰𝗲𝘀. Blending cyber espionage with financially motivated attacks, 𝗔𝗣𝗧𝟰𝟭 continues to exploit vulnerabilities across complex enterprise environments. - Targeting exposed assets across the attack surface - Leveraging sophisticated, multi-stage techniques - Exploiting gaps between IT, cloud, and external systems The takeaway is clear: Organizations need 𝗰𝗼𝗻𝘁𝗶𝗻𝘂𝗼𝘂𝘀 𝘃𝗶𝘀𝗶𝗯𝗶𝗹𝗶𝘁𝘆 𝗮𝗻𝗱 𝗶𝗻𝘁𝗲𝗹𝗹𝗶𝗴𝗲𝗻𝗰𝗲 across their entire attack surface. Read more: https://lnkd.in/gkvNZHYm #CyberSecurity #ThreatIntelligence #APT41 #AttackSurface #Cyble
To view or add a comment, sign in
-
-
We are thrilled to announce our new telco-centric #GenAI assistant based on Microsoft Azure OpenAI Service! This new capability reinforces NetGuard Cybersecurity Dome's protection efficiency by rapidly interpreting vast amounts of information related to cyber threats. Find out more: https://lnkd.in/eg9DjGCK #5gsecurity #networksecurity Microsoft Microsoft Cloud
To view or add a comment, sign in
-
-
Eight minutes. That’s all it took for attacker automation to gain full admin control in AWS. No zero-days. No malware. Just valid credentials used at machine speed. In this new blog, Alex Groyz, Security Researcher at Vectra AI, breaks down how the attack unfolded and why identity-centric, behavioral detection is critical when attackers move this fast. Read more: https://lnkd.in/diRh4H6H #CloudSecurity #AWS #CyberSecurity #IdentitySecurity #VectraAI
To view or add a comment, sign in
-
-
What does a real-world attacker look for first? They do not go straight for the crown jewels. They look for the unlocked side door. Misconfigured S3 buckets. APIs without authentication. Forgotten admin portals. Redfox Cybersecurity's penetration testing engagements simulate exactly this approach - finding the paths attackers actually use. Application Security. Infrastructure. Cloud. Adversary Simulations. Let us find your side door before someone else does. Learn more: https://lnkd.in/dq2dP9Wu #PenetrationTesting #CyberSecurity #ApplicationSecurity #RedTeam #InfoSec
To view or add a comment, sign in
-
-
The latest update for #FidelisSecurity includes "Inside Fidelis CNAPP: A Detailed Look at the Features That Strengthen #Cloud Security" and "Detecting Living-off-the-Land Attacks in OT Networks". #cybersecurity #ThreatDetection #infosec https://lnkd.in/e8x_9ePW
To view or add a comment, sign in
Explore related topics
- How Hackers Use AI in Cyber Attacks
- AI Security Challenges in Cybersecurity
- Understanding AI Security Threats
- The Future of AI Security Strategies
- AI Vulnerabilities and Defense Tactics
- AI-Driven Security Automation
- Trends in Cybersecurity for AI
- Current Trends in Automated Cyber Attacks
- AWS Security Program Best Practices
- Generative AI in Cyber Defense and Attack