SecurityBrief Ireland - Technology news for CISOs & cybersecurity decision-makers

Attack Surface Management stories

Modern boardroom cybersecurity ai orb cracked shield network map

Anthropic's Mythos sparks governance fears over cyber risk

Yesterday
#
digital transformation
#
cloud security
#
application security
Anthropic's Claude Mythos cyber security model and Project Glasswing are fuelling fears that AI-driven vulnerability hunting is becoming a boardroom issue.
Wiz  1

Wiz expands AI security coverage across cloud & edge

Last week
#
hyperscale
#
cloud security
#
edge computing
Wiz adds Red Agent preview and wider tools for AI code, Databricks, multicloud services and edge risk across cloud environments.
Flux result fc41b3aa 8862 4880 bcfd fc720050def5

AI coding speeds up, but security teams fall behind

Last week
#
devops
#
digital transformation
#
application security
AI coding accelerates software delivery, but security teams struggle to keep up as more code, alerts and manual checks pile up.
Flux result ba26dffd 2c48 4e83 87b5 365314843884

ServiceNow completes USD $7.75 billion Armis acquisition

Last week
#
firewalls
#
digital transformation
#
cloud security
ServiceNow bolsters cyber security push with Armis buyout, adding real-time asset visibility and deepening its platform after Veza.
Flux result ad42d32c 7135 4932 a4cb b35aca0c1391

HackerOne launches h1 Validation to tackle AI flaws

Last week
#
devops
#
digital transformation
#
application security
HackerOne unveils h1 Validation as vulnerability reports surge 76% and AI tools speed up discovery, leaving firms struggling to triage real threats.
Flux result 1449a80a d271 47ab a1ef 916b32f14374

AI vulnerability discovery forces boards to rethink cyber risk

Last week
#
data protection
#
application security
#
iam
AI models that can hunt and chain software flaws are forcing boards to rethink cyber defences, while scrutiny grows over Anthropic's MCP design risks.
Flux result 929b3280 4f28 43e8 a8b0 ff57ea3c5716

Anthropic's 'Mythos' signals a new era of AI-driven cyber threats

Last week
#
ransomware
#
devops
#
phishing
Anthropic is to give UK banks controlled access to its Mythos AI model, as financial firms brace for a new era of autonomous cyber threats.
Flux result 74ce5946 2da6 4b6d 9888 4b59ef1216c5

Claroty adds Visibility Orchestration to xDome platform

This month
#
saas
#
manufacturing
#
digital transformation
Claroty boosts xDome with Visibility Orchestration to turn patchy cyber-physical asset data into prioritised security tasks across critical operations.
Flux result b9f1305b 2094 4ed3 b19b b1bfa403068c

Tenable launches OT discovery engine for risk view

This month
#
ai security
#
cybersecurity
#
software
Tenable adds OT asset discovery to its exposure platform, giving security teams a single view of cyber-physical risk without extra hardware.
Flux result c7112620 ee78 433f 9a4b 3ca2ccf1b56c

Tenable launches OT asset discovery engine for security

This month
#
hyperscale
#
cloud security
#
iot security
Tenable adds OT asset discovery to core security tools as Chief Product Officer Eric Doerr says it will expose hidden devices without extra hardware.
Flux result 0d86e3aa 7c87 46fe b286 10172a4c72bd

Tenable launches OT discovery tool for exposure management

This month
#
datacentre infrastructure
#
hyperscale
#
cloud security
Tenable adds OT asset discovery to exposure management platform, helping IT teams spot hidden connected devices and cyber-physical risks.
Flux result 51cf6bc6 caf3 4086 9aca 43f89e74737d

Cloudflare, Wiz link AI security tools for unified view

This month
#
firewalls
#
data protection
#
digital transformation
Cloudflare and Wiz team up to map shadow AI risks across cloud estates and protect sensitive data as firms race to secure chatbot deployments.
Flux result 94989703 8373 4ba4 ade2 933f6522a0ce

Claroty xDome adds orchestration to fix visibility gaps

This month
#
firewalls
#
network security
#
iot security
Claroty adds orchestration to xDome to help security teams close cyber-physical asset visibility gaps and prioritise remediation.
Flux result 586ba468 637e 4df3 afb6 b50756bff00b

Synack launches Glasswing readiness test for attack gaps

This month
#
firewalls
#
devops
#
digital transformation
Synack launches AI-driven assessment to expose overlooked attack surface gaps as offensive tools speed up vulnerability discovery.
Flux result 69d8aedf 698f 4136 9525 1ed7c7a0ec10

Forrester says Anthropic AI could break patch playbook

This month
#
hybrid cloud
#
digital transformation
#
application security
Forrester warns Anthropic's Project Glasswing could overwhelm vulnerability management, as AI uncovers flaws faster than patching teams can respond.
Flux result f3a23773 f3c5 4ab1 8315 098438942b1a

AI agents expose major API security gap, Salt warns

This month
#
manufacturing
#
digital transformation
#
cloud security
Salt warns AI agents are widening the API security gap, with 92% of organisations still short of advanced defences and 47% delaying releases.
Flux result 241e3ccd 7dcb 4941 95cc 1a5ef9df5d45

Intruder adds container image scanning to cloud platform

This month
#
virtualisation
#
devops
#
hybrid cloud
Intruder expands cloud security platform with registry-level container image scanning for AWS, Google Cloud and Azure users.
Flux result e112a964 d384 4305 af87 b1a2a4c0ee5c

Qualys warns attackers exploit flaws before disclosure

This month
#
firewalls
#
vpns
#
network security
Qualys says attackers are exploiting flaws before disclosure as remediation backlogs swell, with edge devices facing the highest risk.
Flux result 0140b590 dfa2 4fdb 8cad 8fa28d461048

Firms warned on ransomware amid backup & AI sprawl

This month
#
saas
#
firewalls
#
data protection
Experts warn firms must improve visibility and backup resilience as automated ransomware campaigns and hidden SaaS and AI assets widen exposure.
Flux result 600dd12e b693 45cc 8e4a 8dfc977dd7c1

Bitdefender launches free attack surface assessment

This month
#
firewalls
#
network security
#
pam
Bitdefender offers free 45-day internal security check to spot over-entitled staff access as attackers increasingly abuse trusted tools.