Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Beyond LLMs: The Strategic Need for MCP Security

Large language models (LLMs) are transforming enterprise operations, but their growing use introduces a critical security challenge: securing how they access sensitive data and integrate with existing tools. This is where Model Context Protocol (MCP) servers become a vital, yet often overlooked, part of AI security. These servers act as the crucial link, enabling LLMs to securely connect with diverse data sources and tools, significantly expanding attack surfaces that demand our immediate attention.

Secure at Inception: Introducing New Tools for Securing AI-Native Development

At Snyk, we believe you should never have to choose between speed and security. As the age of AI transforms software development, our goal is to extend our developer-first security approach to this new era, providing the essential tools your teams need to build with confidence. Today at Black Hat, we are delivering on that vision with three tangible innovations that offer a comprehensive solution to secure the entire code lifecycle with AI.

AI vs. AI: The Race Between Adversarial and Defensive Intelligence

The AI battleground is here. Adversaries are weaponizing AI to launch attacks with unprecedented scale, speed, and effectiveness. In response, defenders are turning to AI as an analyst force-multiplier, using it to offload repetitive tasks, accelerate decision-making, and scale expertise across the SOC.

CrowdStrike 2025 Threat Hunting Report: AI Becomes a Weapon and a Target

Today’s enterprising adversaries are weaponizing AI to scale operations, accelerate attacks, and target the autonomous AI agents quickly transforming modern businesses. The CrowdStrike 2025 Threat Hunting Report details this new chapter in the threat landscape. This year’s report, based on frontline intelligence from CrowdStrike’s elite threat hunters and intelligence analysts, examines how threat actors are using AI to do more with less.

Preventing Data Poisoning in Training Pipelines Without Killing Innovation

Data poisoning occurs when cyber criminals intentionally compromise the integrity of a data set used for training machine learning models. They corrupt the information to manipulate the model’s outcome in the form of incorrect predictions by introducing vulnerabilities that reduce the effectiveness, add security risks, and fundamentally shape its decision making capabilities.