Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Dokie AI Review: GPT Image 2 Makes AI-Generated PPTs Look More Professional

Many AI presentation makers can create slides quickly, but the final result often feels unfinished. The slide structure may be usable, but the visuals can look generic, random, or disconnected from the topic. This is where Dokie AI stands out. Dokie AI is an AI presentation maker built for creating PPT-style decks. It helps users generate structured presentations from prompts, notes, documents, or existing content. With the new support for GPT Image 2, Dokie AI has improved one of the most important parts of presentation quality: the images.

OpenAI Daybreak Just Changed Cybersecurity (Again)

OpenAI just announced Daybreak, their cybersecurity AI model with three tiers of access. GPT-5 handles general work. GPT-5.5 does secure code reviews, vulnerability triage, malware analysis and patch validation. GPT-Cyber handles red teaming and penetration testing. In this episode of Razorwire Raw, James Rees explains what Daybreak means for the cybersecurity industry and why vulnerability scanning companies, pentesting firms and security tool vendors should be concerned.

Your AI coding assistant is leaking secrets

AI desktop assistants and coding tools need credentials to reach external services, and many of them store those credentials as plaintext JSON at predictable paths in the user's home directory. This research covers how credential storage works across 14 popular AI tools, where OS keychain integration is present or missing, and eight attack scenarios that turn that exposure into real risk, from malware-based theft to remote session hijacking to supply-chain compromise via MCP servers.

Mini Shai-Hulud Is Back: npm Worm Hits over 160 Packages, including Mistral and Tanstack

Mini Shai-Hulud is back. Like I said before, we were yet to see the full scale of the attack. The npm campaign we covered in April, when it targeted SAP packages, has now turned into a much larger compromise. Our Malware Team detected 373 malicious package-version entries across 169 npm package names. The basic goal is still the same: steal credentials from developer machines and CI/CD runners, then use those credentials to reach more packages. What changed is the scale and the release path.

Why the Mythos Era Calls for Deception-Based Defense

Deception and Claude Mythos is no longer just a cybersecurity conversation. It’s a paradigm change in how organizations need to consider cyber resilience in the era of AI. Enterprises are facing a new threat landscape in which attackers can find exploits quicker, conduct enterprise-wide reconnaissance with low-level automation, and exploit enterprise assets with unprecedented accuracy on an enterprise-wide scale.

How Fidelis Deception Helps Defend Against AI-Accelerated Intrusions

AI-powered attackers are faster and more systematic than ever. But they still trust what they see. Deception technology controls what they see. 87% of security leaders say AI-related vulnerabilities grew faster than any other risk in 2025 44% year-over-year rise in exploitation of public-facing applications in 2025 300K+ AI platform credentials exposed via infostealer malware on dark web in 2025.