Tag Banner

All news with #agentic ai tag

Thu, September 18, 2025

DeepSeek-V3.1 Available as Fully Managed in Bedrock

🔍 DeepSeek-V3.1 is now available as a fully managed foundation model in Amazon Bedrock, offering an open-weight option designed for enterprise deployment. The model supports a selectable 'thinking' mode for step-by-step analysis and a faster non-thinking mode for quicker replies, with improved multilingual accuracy and reduced hallucinations. Enhanced tool-calling, transparent reasoning, and strong coding and analytical performance make it well suited for building AI agents, automating workflows, and tackling complex technical tasks. DeepSeek-V3.1 is available in US West (Oregon), Asia Pacific (Tokyo, Mumbai), and Europe (London, Stockholm).

read more →

Thu, September 18, 2025

Amazon Bedrock Adds Four Qwen3 Open-Weight Models Now

🤖 Amazon Web Services added four Qwen3 open-weight foundation models to Amazon Bedrock as fully managed, serverless offerings. The lineup—Qwen3-Coder-480B-A35B-Instruct, Qwen3-Coder-30B-A3B-Instruct, Qwen3-235B-A22B-Instruct-2507, and Qwen3-32B—covers both dense and Mixture-of-Experts (MoE) architectures. The coder variants specialize in agentic coding, function calling, and tool use, while the 235B and 32B models provide general reasoning and efficient dense computation. These models are available now across multiple AWS regions, enabling developers to build advanced AI applications without managing infrastructure.

read more →

Thu, September 18, 2025

Mind the Gap: TOCTOU Vulnerabilities in LLM-Enabled Agents

⚠️A new study, “Mind the Gap,” examines time-of-check to time-of-use (TOCTOU) flaws in LLM-enabled agents and introduces TOCTOU-Bench, a 66-task benchmark. The authors demonstrate practical attacks such as malicious configuration swaps and payload injection and evaluate defenses adapted from systems security. Their mitigations—prompt rewriting, state integrity monitoring, and tool-fusing—achieve up to 25% automated detection and materially reduce the attack window and executed vulnerabilities.

read more →

Thu, September 18, 2025

Where CISOs Should See Splunk Go Next: AI & Resilience

🔍 At .Conf in Boston, Splunk and parent company Cisco positioned machine data as central to next‑generation AI incident response, arguing telemetry represents roughly 55% of global data growth. They stressed tighter integration of security and observability, a federated data model with new support for Snowflake, and standards work such as OpenTelemetry and the Open Cybersecurity Framework (OCSF). Splunk also previewed enhanced security operations capabilities — a premier Enterprise Security bundle, Detection Studio, and agentic AI features — while acknowledging customer concerns about costs, legacy positioning, and support.

read more →

Thu, September 18, 2025

CrowdStrike Advances Next-Gen Identity Security Innovations

🔐 CrowdStrike announced three enhancements to Falcon Next‑Gen Identity Security: FalconID, expanded privileged access controls, and identity‑driven case management. FalconID delivers FIDO2-based, phishing-resistant passwordless MFA via the Falcon for Mobile app, combining Bluetooth proximity checks with contextual telemetry to block credential phishing, MFA fatigue, and session hijacking. Privileged access updates add just-in-time workflows, Microsoft Teams request/revoke, Fusion SOAR automation, and hybrid coverage including local systems (early access). Identity-driven case management integrates identity detections into Falcon Next‑Gen SIEM and automates analyst response (generally available).

read more →

Wed, September 17, 2025

New LLM Attack Vectors and Practical Security Steps

🔐This article reviews emerging attack vectors against large language model assistants demonstrated in 2025, highlighting research from Black Hat and other teams. Researchers showed how prompt injections or so‑called promptware — hidden instructions embedded in calendar invites, emails, images, or audio — can coerce assistants like Gemini, Copilot, and Claude into leaking data or performing unauthorized actions. Practical mitigations include early threat modeling, role‑based access for agents, mandatory human confirmation for high‑risk operations, vendor audits, and role‑specific employee training.

read more →

Wed, September 17, 2025

Check Point Acquires Lakera to Build AI Security Stack

🔐 Check Point has agreed to acquire Lakera, an AI-native security platform focused on protecting agentic AI and LLM-based deployments, in a deal expected to close in Q4 2025 for an undisclosed sum. Lakera’s Gandalf adversarial engine reportedly leverages over 80 million attack patterns and delivers detection rates above 98% with sub-50ms latency and low false positives. Check Point will embed Lakera into the Infinity architecture, initially integrating into CloudGuard WAF and GenAI Protect, offering near-immediate, API-based protection as an add-on for existing customers.

read more →

Wed, September 17, 2025

Deploying Agentic AI: Five Steps for Red-Teaming Guide

🛡️ Enterprises adopting agentic AI must update red‑teaming practices to address a rapidly expanding and interactive attack surface. The article summarizes the Cloud Security Alliance’s Agentic AI Red Teaming Guide and corroborating research that documents prompt injection, multi‑agent manipulation, and authorization hijacking as practical threats. It recommends five pragmatic steps—change attitude, continually test guardrails and governance, broaden red‑team skill sets, widen the solution space, and adopt modern tooling—and highlights open‑source and commercial tools such as AgentDojo and Agentgateway. The overall message: combine automated agents with human creativity, embed security in design, and treat agentic systems as sociotechnical operators rather than simple software.

read more →

Wed, September 17, 2025

CrowdStrike Launches Threat AI: Agentic Threat Intel

🔍 CrowdStrike unveiled Threat AI, described as the industry’s first agentic threat intelligence system, built on the Falcon platform to reason, hunt, and act across adversary activity. The initial agents — a Malware Analysis Agent and a Hunt Agent — automate complex workflows like reversing, classification, retrohunting, and continuous threat hunting to surface actionable recommendations. CrowdStrike also released a Threat Intelligence Browser Extension for Chrome to provide intelligence in analysts’ workflows, aiming to accelerate investigations and help SOCs respond at machine speed.

read more →

Wed, September 17, 2025

CrowdStrike Secures AI Across the Enterprise with Partners

🔒 CrowdStrike describes how the Falcon platform delivers unified visibility and lifecycle defense across the full AI stack, from GPUs and training data to inference pipelines and SaaS agents. The post highlights integrations with NVIDIA, AWS, Intel, Dell, Meta, and Salesforce to extend protection into infrastructure, data, models, and applications. It also introduces agentic defense via Charlotte AI for autonomous triage and rapid response, and emphasizes governance controls to prevent data leaks and adversarial manipulation.

read more →

Tue, September 16, 2025

CrowdStrike Unveils Agentic AI Platforms After Onum Deal

🤖 CrowdStrike is expanding its agentic AI strategy following its $290 million acquisition of Onum, introducing two initiatives designed to accelerate real-time telemetry and automate SOC workflows. The Agentic Security Platform builds an "enterprise graph" with a semantic data model that acts as a Rosetta Stone to normalize diverse telemetry and enable a global query and command engine. Agent Works provides a no-code environment to create, test, and deploy agentic systems, while the Agentic Security Workforce delivers mission-ready agents in Falcon sensors to automate repetitive analyst tasks and enforce data-protection controls across endpoints.

read more →

Tue, September 16, 2025

Chinese AI Villager Pen-Testing Tool: 11,000 PyPI Downloads

🧭 Villager, an AI-native penetration testing framework developed by Chinese group Cyberspike, has reached nearly 11,000 downloads on PyPI just two months after release. The tool integrates Kali Linux utilities with DeepSeek AI models and operates as a Model Context Protocol (MCP) client to automate red team workflows. Researchers at Straiker reported that Villager can spin up on-demand Kali containers, automate browser testing, use a database of more than 4,200 prompts for decision-making, and deploy self-destructing containers — features that lower the barrier to sophisticated attacks and raise concerns about dual-use abuse.

read more →

Tue, September 16, 2025

Google Announces AP2: Protocol for Agent-Led Payments

🤖 Google introduced the Agent Payments Protocol (AP2), an open standard developed with more than 60 payments and technology firms to enable secure, agent-initiated transactions across platforms. AP2 extends A2A and MCP, using cryptographically-signed Mandates and verifiable credentials to prove authorization, ensure authenticity, and provide a non-repudiable audit trail. The protocol supports cards, real-time bank transfers, and crypto.

read more →

Tue, September 16, 2025

Villager: AI-Native Red-Teaming Tool Raises Alarms

⚠ Villager is an AI-native red-teaming framework from a shadowy Chinese developer, Cyberspike, that has been downloaded more than 10,000 times in roughly two months. The tool automates reconnaissance, exploitation, payload generation, and lateral movement into a single pipeline, integrating Kali toolsets with DeepSeek AI models and publishing on PyPI. Security firms warn the automation compresses days of skilled activity into minutes, creating dual-use risks for both legitimate testers and malicious actors and raising supply-chain and detection concerns.

read more →

Tue, September 16, 2025

FabCon Vienna: Enterprise-ready Microsoft Fabric updates

📢 At FabCon Vienna, Microsoft unveiled a broad set of Microsoft Fabric enhancements to accelerate data-rich agents and enterprise adoption. Key updates include expanded OneLake shortcuts and mirroring (preview for Oracle and BigQuery), a preview Graph database and Maps for geospatial context, developer tooling (MCP, Extensibility Toolkit, CI/CD) and strengthened security controls like Azure Private Link and customer-managed keys. These features focus on zero-copy data access, governance, and operational scalability for mission-critical workloads.

read more →

Tue, September 16, 2025

Securing the Agentic Era: Astrix's Agent Control Plane

🔒 Astrix introduces the industry's first Agent Control Plane (ACP) to enable secure-by-design deployment of autonomous AI agents across the enterprise. ACP issues short-lived, precisely scoped credentials and enforces just-in-time, least-privilege access while centralizing inventory and activity trails. The platform streamlines policy-driven approvals for developers, speeds audits for security teams, and reduces compliance and operational risk by discovering non-human identities (NHIs) and remediating excessive privileges in real time.

read more →

Tue, September 16, 2025

Google for Startups Accelerator: AI First MENA & Turkey

🚀 Today Google announced 14 startups selected for the Google for Startups Accelerator: AI First program serving the Middle East, North Africa, and Turkey. The cohort addresses challenges across finance, real estate, healthcare, industrial safety, TradeTech, and education, and will receive targeted mentorship, technical training, and product and business support. Participants include Abwab.ai, COGNNA, Distichain, xBites, and Navatech, and the program emphasizes responsible AI to accelerate regional scaling and commercialization.

read more →

Tue, September 16, 2025

CISOs Assess Practical Limits of AI for Security Ops

🤖 Security leaders report early wins from AI in detection, triage, and automation, but emphasize limits and oversight. Prioritizing high-value telemetry for real-time detection while moving lower-priority logs to data lakes improves signal-to-noise and shortens response times, according to Myke Lyons. Financial firms are experimenting with agentic AI to block business email compromise in real time, yet researchers and practitioners warn of missed detections and 'ghost alerts.' Organizations that treat AI as a copilot with governance, explainability, and institutional context see more reliable, safer outcomes.

read more →

Tue, September 16, 2025

CrowdStrike Falcon: Building an Agentic Security Platform

🚀 The CrowdStrike Falcon fall release reframes the platform as an Agentic Security Platform, introducing four core innovations: Enterprise Graph, Charlotte AI AgentWorks, the Agent Collaboration framework (powered by MCP), and an AI-native console. Enterprise Graph unifies telemetry into a real-time, AI-ready data layer to give humans and agents shared context. Charlotte AI AgentWorks delivers a no-code environment to design, test, deploy, and govern mission-specific security agents at scale, while MCP enables secure, orchestrated multi-agent collaboration.

read more →

Tue, September 16, 2025

CrowdStrike to Acquire Pangea to Secure Enterprise AI

🔒 CrowdStrike announced its intent to acquire Pangea to deliver the industry’s first AI detection and response (AIDR) capability, securing enterprise AI use and development across data, models, agents, identities, infrastructure, and interactions. Unveiled at Fal.Con 2025 by Michael Sentonas, the deal will integrate Pangea’s prompt‑layer and interaction security with the Falcon platform to provide unified visibility, governance, and enforcement across the AI lifecycle. The combined solution targets prompt injection, model manipulation, shadow AI and sensitive data exfiltration while enabling developers and security teams to innovate faster with built‑in safeguards.

read more →