IT Brief UK - Technology news for CIOs & IT decision-makers

Red Teaming stories

457

Applause appoints Aatish Salvi as Chief Technology Officer

Today
#
devops
#
digital transformation
#
cx
Applause appoints Aatish Salvi as Chief Technology Officer to steer AI-driven testing as the software quality specialist expands its enterprise offering.
Flux result 586ba468 637e 4df3 afb6 b50756bff00b

Synack launches Glasswing readiness test for attack gaps

Yesterday
#
firewalls
#
devops
#
digital transformation
Synack launches AI-driven assessment to expose overlooked attack surface gaps as offensive tools speed up vulnerability discovery.
Tom cole  1

Abacus wins CREST approval for penetration testing

Last week
#
firewalls
#
data protection
#
devops
Abacus secures CREST accreditation for penetration testing, bolstering its pitch to regulated sectors as demand rises for verified cyber security assurance.
Flux result 9a5fbf33 4cd5 4f62 a705 c822376a1b61

Claude Code flaw leaves deny rules vulnerable in long workflows

Last week
#
cloud security
#
application security
#
socs
Anthropic’s Claude Code is under scrutiny after researchers found deny rules can weaken in long workflows, raising fresh concerns for AI-driven development.
Flux result b89f46aa 0edc 4965 9487 cdd46bf5a418

ChatGPT flaw let hackers steal data via DNS queries

This month
#
firewalls
#
data protection
#
devops
ChatGPT flaw may have let attackers siphon sensitive user data via DNS queries, prompting OpenAI to issue a fix after researchers exposed the bug.
Flux result 4fd4ec51 3ee5 4138 9d86 cf53ec65c7ba

F5 & Forcepoint come together to secure enterprise AI

This month
#
data protection
#
hybrid cloud
#
digital transformation
F5 and Forcepoint have teamed up to link data discovery with runtime controls, aiming to curb AI risks as enterprises move systems into production.
John maddison  chief marketing officer at f5

F5 & Forcepoint join forces on enterprise AI security

Last month
#
data protection
#
digital transformation
#
application security
F5 and Forcepoint team up to give enterprises continuous AI security, linking data discovery with runtime controls to reduce risk in production systems.
Flux result 05469706 4bde 42de be79 376351dd4b3e

OpenAI launches safety bug bounty for AI abuse risks

Last month
#
physical security
#
ai security
#
risk & compliance
OpenAI opens public Safety Bug Bounty to find agentic prompt injection, data exfiltration and other AI misuse risks.
Flux result 71688744 a7df 404c 89a9 713dc308b84c

F5 & Forcepoint join to secure enterprise AI systems

Last month
#
firewalls
#
data protection
#
hybrid cloud
F5 and Forcepoint have teamed up to link data governance with live runtime controls, closing security gaps across enterprise AI lifecycles.
Tom 1

CrowdStrike extends flexible services model to partners

Last month
#
digital transformation
#
cloud security
#
advanced persistent threat protection
CrowdStrike broadens its consumption-based model into services, offering partners and new customers flexible access to incident response and advisory support.
David haber 1

Check Point launches AI Defence Plane for enterprise

Last month
#
data protection
#
physical security
#
casb
Check Point unveils AI defence plane to help enterprises govern employee tools, applications and autonomous agents at runtime.
Cybersecurity analyst ai red teaming prompt injection shield branching

Novee launches AI red teaming tool for LLM app risks

Last month
#
devops
#
cloud security
#
application security
Novee unveils an autonomous AI red teaming tool to probe LLM apps for prompt injection, jailbreaks and other emerging security flaws.
Enterprise security ops center analyzing live attack path highlighted route

Qualys launches Agent Val to prove exploitable risks

Last month
#
socs
#
cybersecurity
#
agentic ai
Qualys debuts Agent Val to validate real exploit paths in live systems, promising sharply reduced noise and faster remediation for teams.
Flux result b75b6c52 41bc 48f4 a421 ca157511836e

NSS Labs backs AI guardrail tests amid security fears

Last month
#
firewalls
#
devops
#
digital transformation
NSS Labs warns many enterprise AI guardrails fail basic security tests, urging independent, real-world validation of protections.
Modern enterprise soc ai agent monitoring automated threat investigation

SentinelOne unveils new AI security tools for agents

Last month
#
siem
#
digital transformation
#
cloud security
SentinelOne unveils new AI security suite to govern autonomous agents, automate threat investigations and streamline data in its SIEM.
Disassembled industrial cellular iot device usb analyzer tech probing

Rapid7 warns of cellular IoT hardware attack risks

Last month
#
uc
#
firewalls
#
devops
Rapid7 warns that hands-on attacks against cellular IoT hardware can pivot through trusted modules to breach cloud and backend systems.
Focused software security analyst ai assistant code monitor oversight

OpenAI monitors internal coding agents for risky conduct

Last month
#
devops
#
physical security
#
apm
OpenAI unveils a GPT-5.4-powered system that audits its own coding agents for rule-bending behaviour, flagging suspicious sessions to humans.
Global cities cyber attacks fragile chains cracked data shards

Kroll warns of widening gap in global cyber resilience

Last month
#
dr
#
devops
#
digital transformation
Kroll warns boards are overestimating cyber resilience as attacks cost firms an average USD $2.2 million a year and response plans lag reality.
Modern enterprise soc unified cloud server network threat maps hub

Simbian launches AI platform for unified cyber ops

Last month
#
devops
#
cloud security
#
application security
Simbian unveils an AI-driven cyber security platform uniting offence and defence via a shared Context Lake to speed, link and automate response.
Editorial cybersecurity analyst pen test results attack path cloud diagrams

Cobalt adds AI features to boost continuous pentests

Last month
#
devops
#
cloud security
#
application security
Cobalt weaves AI into its pentesting platform, automating recon and triage while keeping human experts on complex attack paths.