DeepTempo announced a strategic partnership with Cribl, the Data Engine for IT and Security. Together, the companies are delivering an integrated solution that streamlines telemetry collection and unleashes deep learning-powered detection to stop polymorphic and agentic AI-driven threats. At the core of the offering is Tempo, DeepTempo’s flagship platform. By combining Tempo’s advanced analytics with Cribl’s data collection and management capabilities, customers gain high-fidelity detections, faster investigations, and significant cost savings without the complexity of managing multiple collectors or preprocessing pipelines. Key Benefits for Security Teams: Unified telemetry management: Cribl Stream, Lake, and Search unite the telemetry lifecycle—collecting, routing, tiering, and instantly searching logs, metrics, and events from any source in any format. The product suite enables centralized control, flexible access, and lower costs through seamless object store integration and federated search. Schema-aware enrichment: Cribl’s Copilot Editor automatically maps raw telemetry to industry schemas (OCSF, ECS, UDM, ASIM), while Tempo layers in behavioral enrichment to accelerate time-to-insight. Behavior-first detection: Tempo’s LogLM, built and trained by DeepTempo, identifies subtle deviations from normal activity, from reconnaissance to lateral movement, with false positives under 1% after domain adaptation. The platform is agent-free and optimized for modern data lake and cloud-native environments. Accelerated performance: NVIDIA GPU acceleration and RAPIDS integration enable high-throughput, real-time analysis of massive data volumes without sacrificing accuracy. Faster SOC workflows: Tempo automatically tags sequences with MITRE ATT&CK techniques, builds forensic timelines, and uses vector-based correlation for rapid triage and root-cause analysis. Replay capabilities allow data retrieval from low-cost storage for investigation and model fine-tuning. Cost optimization: Intelligent data routing and reduced false positives can lower SIEM licensing costs by up to 45%.
RedShield’s solution secures against DDoS and automated bot attacks by deploying an identity and intent challenge that requires a valid email address and a code sent to that email
RedShield has introduced a new cybersecurity feature called ‘Third Horizon’ to provide additional protection against Distributed Denial-of-Service (DDoS) and automated bot attacks. The technology disrupts attack methods and forces attackers to adapt in ways that traditional automated or artificial intelligence-driven tools cannot manage effectively. The Third Horizon feature challenges suspicious users seeking access to an application by requiring them to supply a valid email address and verify their identity using a code sent to that email. This adds complexity for attackers using automated systems, as they typically struggle to answer such requests at scale. RedShield’s service operates using a three-tiered architecture for threat defence. The first layer, the First Horizon, uses traffic profiling to block high-volume attacks and malicious traffic. The second layer focuses on sophisticated bot detection, targeting malicious bots attempting to appear as legitimate users. The Third Horizon provides an identity and intent challenge, requiring suspicious users to confirm an email address before accessing a site or application. Recent findings highlight the scale of the challenge facing organizations, with automated bots accounting for nearly half of all internet traffic in 2024 and DDoS attacks increasing 1800% globally from the third to the fourth quarter of last year. RedShield is extending its layered approach by offering the Third Horizon as an optional add-on service for customers requiring heightened protection.
Google’s AI agent discovers a critical SQLite vulnerability using threat intelligence and was able to actually predict that it was imminently going to be exploited for carrying out a cyberattack
Google is introducing a new approach to cybersecurity, focusing on artificial intelligence as the first line of digital defence. The company has introduced Big Sleep, an AI agent developed by Google DeepMind in collaboration with Project Zero, which has successfully stopped a security threat before it was launched. The tool is also being used to strengthen the security of open-source software, increasing defensive coverage. Google’s secure-by-design approach emphasizes human oversight, transparency, and privacy. In addition to Big Sleep, Google is infusing AI into its security infrastructure: Timesketch, the company’s open-source forensics platform, now integrates Sec-Gemini-powered agents to automate incident response. FACADE, an insider threat detection tool, processes billions of security events each day using contrastive learning, without relying on historical attack data. A new AI-assisted Capture the Flag challenge at DEF CON 33 will give participants hands-on experience working alongside AI agents in real-time cyber defence scenarios.
Yubico’s Enhanced PIN feature to offer comprehensive PIN management for users with enforcement policies and PIN complexity applied by default, always-on user verification and minimum PIN length of six characters
Yubico has introduced the YubiKey 5 – Enhanced PIN, offering additional PIN capabilities for enterprises in 175 countries and 24 territories. The product is pre-configured with features to improve PIN management and user enforcement, including a mandatory minimum PIN length and requirements for increased complexity. This helps organizations meet evolving policy, compliance, and audit requirements for user authentication. The Enhanced PIN features are available on the YubiKey 5 NFC and YubiKey 5C NFC models, specifically through the YubiKey as a Service platform. The company has expanded its YubiKey as a Service to include all European Union countries and expanded its YubiEnterprise Delivery to 117 locations globally. The expanded service and new key features reflect Yubico’s effort to address the challenges posed by a changing cybersecurity landscape and varying global regulatory requirements, supporting enterprise customers in their transition to more robust authentication systems.
Akeyless enables AI agents to authenticate using dynamic, just-in-time verifiable machine identities such as cloud IAM roles eliminating the need to embed secrets in code, containers, or pipelines
Akeyless, the Unified Secrets & Machine Identity Platform for the AI-driven Era, announced the launch of Akeyless SecretlessAI, a breakthrough solution purpose-built to secure the rapidly expanding universe of AI agents and Model Context Protocol (MCP) servers. Akeyless SecretlessAI™ eliminates the need to embed secrets in code, containers, or pipelines. Instead, it introduces dynamic, just-in-time secrets provisioning, where AI agents and MCP servers authenticate using verifiable machine identities — such as cloud IAM roles or Kubernetes service accounts. Akeyless extends traditional secrets management by integrating with advanced identity frameworks like SPIFFE (Secure Production Identity Framework for Everyone) through its SPIRE plugins, enabling a ‘secretless’ authentication model for workloads. Additionally, Akeyless offers built-in PKI-as-a-Service capabilities that automate the lifecycle of certificates, including issuance, renewal, and revocation, all within a secure and scalable SaaS platform. Based on centrally managed policies, Akeyless provisions ephemeral, tightly scoped secrets at runtime. This approach drastically reduces the window of compromise and supports Zero Trust and Least Privilege principles. The solution offers comprehensive auditing and centralized governance, providing visibility into every request and action. It enables policy-based access control and full lifecycle automation, empowering security and DevOps teams to enforce compliance without slowing innovation.
Ataccama brings AI to data lineage- Business users can now trace a data point’s origin and understand how it was profiled or flagged without relying on IT
Tippu Gagguturu, CEO of SecurEnds, has launched APIDynamics, a next-generation API security company designed for machine-first, cloud-native ecosystems. The company addresses the gap between strict controls for user identities and minimal oversight for machine identities, the primary drivers of API traffic. APIDynamics offers real-time protection, adaptive authentication, and MFA for API-to-API communication, securing every API call, including machine-to-machine and non-human interactions. Gagguturu believes static tokens and blind trust are no longer viable with APIs driving AI agents and cloud workflows. The platform empowers security and engineering teams to: Discover and eliminate shadow and zombie APIs across environments; Secure machine-to-machine and non-human identity communications with Zero Trust; Enforce just-in-time, risk-based access policies using adaptive MFA; Integrate seamlessly into modern DevSecOps pipelines without slowing development.
Empirical Security combines the power of global threat intelligence with localized, organization-specific insights delivering highly accurate threat prioritization based on the specific context of the organization
Cybersecurity startup Empirical Security raised $12 million in new funding to develop and deploy custom artificial intelligence cybersecurity models tailored to each organization’s unique infrastructure and threat landscape. Empirical’s platform offers dual-model architecture that combines the power of global threat intelligence with localized, organization-specific insights. The models are trained on about 2 million daily exploitation events sourced from internet-scale datasets, while local models are fine-tuned using customer-provided and curated internal data. That, delivers highly accurate threat prioritization based on the specific context of the organization. The approach is designed to allow cybersecurity teams to make faster, evidence-based decisions, backed by predictive models that highlight the most critical vulnerabilities. The idea is that instead of relying on generic risk scores that may not reflect the actual danger to a specific business, the company’s local models provide actionable intelligence customized to a given company’s operational environment. Empirical also emphasizes explainability and decision support as key elements of its platform. The platform gives security leaders the ability to justify their strategies with data by integrating risk-based analysis with measurable prediction outputs. The transparency is especially valuable in boardroom discussions, compliance reporting and budgeting, where clear articulation of cybersecurity priorities is essential.
Cyabra detects deepfakes using spatio-frequency analysis to detect invisible pixel inconsistencies, and identifies unnatural movement patterns and lip-sync errors across video frames
Cyabra Strateg, the AI-powered platform for real-time disinformation detection, has launched launch of its advanced deepfake detection tool designed to help brands and governments counter the growing threat of AI-generated “synthetic” media. The new capability uses AI to analyze images and videos for signs of manipulation, providing rapid verification of content authenticity. Cyabra’s tool empowers organizations to distinguish real content from convincing forgeries, detecting threats to brand reputation and public safety. The advanced detection tool leverages two proprietary AI models: PixelProof for images and MotionProof for videos. PixelProof uses spatio-frequency analysis to detect invisible pixel inconsistencies, while MotionProof identifies unnatural movement patterns and lip-sync errors across video frames. Both models deliver results in seconds and provide confidence scores with visual heatmap explanations showing exactly where content appears manipulated. The advanced detection tool leverages two proprietary AI models: PixelProof for images and MotionProof for videos. PixelProof uses spatio-frequency analysis to detect invisible pixel inconsistencies, while MotionProof identifies unnatural movement patterns and lip-sync errors across video frames. Both models deliver results in seconds and provide confidence scores with visual heatmap explanations showing exactly where content appears manipulated. The deepfake detector works in concert with its existing suite of tools for authenticity analysis, narrative tracking, and 24/7 real-time monitoring. This integrated approach gives government agencies and corporations the context and early-warning signals needed to counter complex disinformation threats.
United Network launches NFC non-custodial card wallet transforming a traditional bank card into a secure hardware crypto tool; ensures all transactions are secured directly on the chip, providing unparalleled security and ease of use for digital asset management
United Network has launched its innovative NFC non-custodial card wallet, transforming a traditional bank card into a secure hardware crypto tool. This innovative solution ensures all transactions are secured directly on the chip, providing unparalleled security and ease of use for digital asset management. All private keys are stored only on the card and are never shared with any external devices or services, ensuring a high level of security. The United Network card wallet offers a seamless user experience through its intuitive web interface or mobile application. Users can manage their digital crypto assets with the simplicity of NFC authentication via their smartphone and advancement of hardware wallet, making complex cryptocurrency operations as easy as a tap. The card form factor helps eliminate the complicated usage often associated with traditional hardware wallets, such as the need to connect to a desktop or laptop by cable. The solution was developed according to strict data protection standards. Every device undergoes security testing, so users can be confident their funds are safe, even in case of a card loss. Key Highlights of the United Network Card Wallet: Comprehensive Functionality: Effortlessly send, receive, store, and swap your tokens to any other crypto wallet with just a tap of a card. Card-Sized. Power-Packed: Slides into your wallet like any bank card, offering simple, secure access while keeping private keys fully in the user’s control. Multichain Support: Supports Bitcoin, Solana, Ethereum, BNB Chain, TON, Venom, and Tron from day one, with more chains coming soon. Top-Tier Security: Implements multichain cryptography and standards for robust security.Seamless Web3 Integration: Facilitates effortless authentication into Web3 applications. Flexible White-Label Opportunities: United Network offers customizable solutions for corporate and white-label needs.
Salt Edge’s API solution to leverage IBM Z platform to enable banks to meet evolving global open banking regulations and simplify compliance with built-in consent management without overhauling their core systems
Salt Edge, a global provider of API technology for financial services, has confirmed its Open Banking API suite is compatible with IBM LinuxONE and IBM Z platforms, allowing global banks to implement a fully managed API access layer that meets evolving open banking compliance requirements. The solution leverages IBM Z’s performance, security, and scalability to help financial institutions modernize customer-facing services without overhauling their core systems. Salt Edge’s platform supports a broad range of open banking regulatory frameworks, simplifying compliance by exposing consent-based APIs that align with local laws and market needs. When deployed on IBM LinuxONE or IBM Z, Salt Edge’s platform enables banks to: Meet global open banking regulations without incremental development; Offer API-based services to fintechs and third parties with reduced operational burden; Accelerate time-to-market with built-in consent management, developer tools, and third-party onboarding; Leverage the reliability and performance of enterprise-class infrastructure to support critical workloads.