Tag: Defender

  • Slashdot: AI Is Reshaping Hacking. No One Agrees How Fast

    Source URL: https://it.slashdot.org/story/25/08/16/1936221/ai-is-reshaping-hacking-no-one-agrees-how-fast Source: Slashdot Title: AI Is Reshaping Hacking. No One Agrees How Fast Feedly Summary: AI Summary and Description: Yes Summary: The text discusses advancements in AI agents presented at the Black Hat conference, highlighting how these innovations could potentially enhance the capabilities of cybersecurity defenders. However, it also underscores the duality of…

  • Cloud Blog: Forrester study: Customers cite 240% ROI with Google Security Operations

    Source URL: https://cloud.google.com/blog/products/identity-security/forrester-study-customers-cite-240-percent-roi-with-google-security-operations/ Source: Cloud Blog Title: Forrester study: Customers cite 240% ROI with Google Security Operations Feedly Summary: As part of Google Cloud’s fundamental belief that robust security can enable business resilience and innovation, we’re committed to empowering security operations teams with solutions that deliver measurable value and demonstrable return on investment (ROI).That’s why…

  • The Register: Red teams are safe from robots for now, as AI makes better shield than spear

    Source URL: https://www.theregister.com/2025/08/11/ai_security_offense_defense/ Source: The Register Title: Red teams are safe from robots for now, as AI makes better shield than spear Feedly Summary: The bad news? The machines, and their operators, are coming on fast Black Hat/DEF CON At the opening of Black Hat, the largest security shindig in the Hacker Summer Camp week…

  • Cloud Blog: Boosting defenders with AI: What’s coming at Security Summit 2025

    Source URL: https://cloud.google.com/blog/products/identity-security/boosting-defenders-with-ai-whats-coming-at-security-summit-2025/ Source: Cloud Blog Title: Boosting defenders with AI: What’s coming at Security Summit 2025 Feedly Summary: While AI can help empower defenders, it can also create new security challenges. Those two critical, interconnected themes are driving our announcements and presentations for this year’s Google Cloud Security Summit.Join us live for Security Summit…

  • Microsoft Security Blog: Announcing public preview: Phishing triage agent in Microsoft Defender

    Source URL: https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/announcing-public-preview-phishing-triage-agent-in-microsoft-defender/4438301 Source: Microsoft Security Blog Title: Announcing public preview: Phishing triage agent in Microsoft Defender Feedly Summary: The Phishing Triage Agent in Microsoft Defender is now available in Public Preview. It tackles one of the most repetitive tasks in the SOC: handling reports of user-submitted phish. The post Announcing public preview: Phishing triage…

  • Microsoft Security Blog: Elevate your protection with expanded Microsoft Defender Experts coverage

    Source URL: https://techcommunity.microsoft.com/blog/microsoftsecurityexperts/elevate-your-protection-with-expanded-microsoft-defender-experts-coverage/4439134 Source: Microsoft Security Blog Title: Elevate your protection with expanded Microsoft Defender Experts coverage Feedly Summary: Defender Experts now offers 24/7, expert-driven protection for cloud workloads, beginning with hybrid and multicloud servers in Microsoft Defender for Cloud. Additionally, third-party network signals can be used in Microsoft Defender Experts for XDR to enhance…

  • Schneier on Security: Measuring the Attack/Defense Balance

    Source URL: https://www.schneier.com/blog/archives/2025/07/measuring-the-attack-defense-balance.html Source: Schneier on Security Title: Measuring the Attack/Defense Balance Feedly Summary: “Who’s winning on the internet, the attackers or the defenders?” I’m asked this all the time, and I can only ever give a qualitative hand-wavy answer. But Jason Healey and Tarang Jain’s latest Lawfare piece has amassed data. The essay provides…

  • Unit 42: The Covert Operator’s Playbook: Infiltration of Global Telecom Networks

    Source URL: https://unit42.paloaltonetworks.com/infiltration-of-global-telecom-networks/ Source: Unit 42 Title: The Covert Operator’s Playbook: Infiltration of Global Telecom Networks Feedly Summary: Recent activity targeting telecom infrastructure is assessed with high confidence to overlap with Liminal Panda activity. The actors used custom tools, tunneling and OPSEC tactics for stealth. The post The Covert Operator’s Playbook: Infiltration of Global Telecom…