Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italian
  • English
SecurityIT | Cyber Security Consulting
 
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
×
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
SecurityIT | Cyber Security Consulting
 
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
×
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts

Category: agentic AI

  1. Home
  2. agentic AI

Microsoft Highlights Security Risks Introduced by New Agentic AI Feature

Without proper security controls, AI agents could perform malicious actions, such as data exfiltration and malware installation.

The post Microsoft Highlights Security Risks Introduced by New Agentic AI Feature appeared first on SecurityWeek.

Secure.com Raises $4.5 Million for Agentic Security

The cybersecurity company has launched Digital Security Teammate (DST), AI agents that investigate, triage, and escalate incidents when needed.

The post Secure.com Raises $4.5 Million for Agentic Security appeared first on SecurityWeek.

Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign

A state-sponsored threat actor manipulated Claude Code to execute cyberattacks on roughly 30 organizations worldwide.

The post Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign appeared first on SecurityWeek.

Follow Pragmatic Interventions to Keep Agentic AI in Check

Agentic AI speeds operations, but requires clear goals, least privilege, auditability, red‑teaming, and human oversight to manage opacity, misalignment, and misuse.

The post Follow Pragmatic Interventions to Keep Agentic AI in Check appeared first on SecurityWeek.

Keycard Emerges From Stealth Mode With $38 Million in Funding

The company’s IAM platform identifies AI agents, supports assigning permission to them, and tracks all activity.

The post Keycard Emerges From Stealth Mode With $38 Million in Funding appeared first on SecurityWeek.

Top 25 MCP Vulnerabilities Reveal How AI Agents Can Be Exploited

top-25-mcp-vulnerabilities-reveal-how-ai-agents-can-be-exploited

A new ranking of Model Context Protocol weaknesses highlights critical risks—from prompt injection to command injection—and provides a roadmap for securing the foundations of agentic AI.

The post Top 25 MCP Vulnerabilities Reveal How AI Agents Can Be Exploited appeared first on SecurityWeek.

Geordie Emerges From Stealth With $6.5M for AI Agent Security Platform

Geordie has developed a platform that gives enterprises deep visibility into AI agents and what they are doing.

The post Geordie Emerges From Stealth With $6.5M for AI Agent Security Platform appeared first on SecurityWeek.

From Ex Machina to Exfiltration: When AI Gets Too Curious

From prompt injection to emergent behavior, today’s curious AI models are quietly breaching trust boundaries.

The post From Ex Machina to Exfiltration: When AI Gets Too Curious appeared first on SecurityWeek.

Should We Trust AI? Three Approaches to AI Fallibility

Experts unpack the risks of trusting agentic AI, arguing that fallibility, hype, and a lack of transparency demand caution—before automation outpaces our understanding.

The post Should We Trust AI? Three Approaches to AI Fallibility appeared first on SecurityWeek.

The Wild Wild West of Agentic AI – An Attack Surface CISOs Can’t Afford to Ignore

As organizations rush to adopt agentic AI, security leaders must confront the growing risk of invisible threats and new attack vectors.

The post The Wild Wild West of Agentic AI – An Attack Surface CISOs Can’t Afford to Ignore appeared first on SecurityWeek.

  • 1
  • 2
  • Next
SecurityIT | Cyber Security Consulting
Linkedin-in Envelope Map-marker-alt

The group

  • Company
  • ISO certified company
  • About Us
  • Team
  • Culture and values
  • Mission
×
  • Company
  • ISO certified company
  • About Us
  • Team
  • Culture and values
  • Mission

Services

  • Computer consulting services
  • Social media Security
  • Forensic analysis and investigation
  • Services of cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Vulnerability assessment consulting
  • Consulenza informatica in ambito privacy
  • ADVICE ISO / IEC 27001
  • Penetration test
×
  • Computer consulting services
  • Social media Security
  • Forensic analysis and investigation
  • Services of cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Vulnerability assessment consulting
  • Consulenza informatica in ambito privacy
  • ADVICE ISO / IEC 27001
  • Penetration test
© show.it | All Rights Reserved | VAT 06984320017 | Privacy Policy | Cookie Policy | Made by incio.it