Cloudflare is introducing AI Security Posture Management (AI-SPM) into Cloudflare One, its Zero Trust platform to allow organizations to safeguard against a range of potential threats posed by the wide adoption of AI tools, enabling businesses to move faster with the confidence that AI is being used safely by all teams. Now, with the availability of all features, security teams will be able to: Discover how employees are using AI: With Cloudflare’s new Shadow AI Report, security teams can get instant insights from their traffic to gain a clear, data-driven picture of their organization’s AI usage. This granular view allows them to see not just that an employee is using an AI app, but which AI app, and what users are accessing it. Protect against Shadow AI: Cloudflare Gateway makes it easy to automatically enforce AI policies at the edge of Cloudflare’s network, ensuring consistent security for every employee, no matter where they work. Security teams can choose to fully block unapproved AI applications, limit the types of data uploaded into AI applications, and complete reviews of AI tools, to ensure they continue to meet security and privacy standards. Safeguard sensitive data without fully restricting AI usage: AI Prompt Protection allows security teams to identify potentially dangerous or risky employee interactions with AI models, and flag those prompts and responses. Policies can now be enforced inline at the prompt level to mitigate risk early on, and warn the employee about, or block them from, submitting sensitive data—like source code—being entered into an untrusted AI provider. This will give security teams the control they need to monitor company data that may be sent outside the organization, without fully restricting employees’ usage of AI tools. Gain visibility of AI model interactions with tools outside the business: Zero Trust MCP Server Control consolidates all MCP tool calls—a request from an AI model or application to a server to execute a specific task—into a single dashboard. This visibility ultimately allows all MCP traffic, regardless of origin, to be routed through Cloudflare for increased control and access management. Now, with centralized insights, security teams can set user-level policies at both the gateway and individual MCP server levels.
Google’s AI agent discovers a critical SQLite vulnerability using threat intelligence and was able to actually predict that it was imminently going to be exploited for carrying out a cyberattack
Google is introducing a new approach to cybersecurity, focusing on artificial intelligence as the first line of digital defence. The company has introduced Big Sleep, an AI agent developed by Google DeepMind in collaboration with Project Zero, which has successfully stopped a security threat before it was launched. The tool is also being used to strengthen the security of open-source software, increasing defensive coverage. Google’s secure-by-design approach emphasizes human oversight, transparency, and privacy. In addition to Big Sleep, Google is infusing AI into its security infrastructure: Timesketch, the company’s open-source forensics platform, now integrates Sec-Gemini-powered agents to automate incident response. FACADE, an insider threat detection tool, processes billions of security events each day using contrastive learning, without relying on historical attack data. A new AI-assisted Capture the Flag challenge at DEF CON 33 will give participants hands-on experience working alongside AI agents in real-time cyber defence scenarios.
Blink Operations no-code platform lets users create unlimited, tailored micro‑agents focused on specific security tasks by leveraging visual editors or natural‑language prompts to orchestrate actions from a library of 30,000+ integrations and pre-built workflows
Enterprise cybersecurity automation platform Blink Operations has raised $50 million in new funding to accelerate its go-to-market efforts and scale updeployment of its no-code cybersecurity micro-agents platform. BlinkOps offers cybersecurity automation that gives organizations the ability to build, collaborate on and scale up security workflows via artificial intelligence-driven, no-code and low-code interfaces. The company’s platform serves as an automation hub where security teams leverage visual editors or natural‑language prompts to orchestrate actions from a library of more than 30,000 integrations and pre-built workflows. BlinkOps’ Security Micro‑Agent Builder, which launched in April, provides a drag‑and‑drop, no-code interface that allows users to create unlimited, tailored micro‑agents focused on specific security tasks, such as identity and access management, patching, alert triage, device control or vulnerability response. Agents can be assigned defined roles, domain‑specific knowledge and secure operational abilities, offering deterministic and auditable automation. The company’s micro-agents can work collaboratively as agent “teams,” communicating with each other to manage complex multistep workflows. The idea is that by distributing work across role‑specialized agents, the platform avoids reliance on a single overload‑prone agent, enabling scalable, reliable automation while keeping human-in-the-loop flexibility where needed.
New Federal Reserve toolkits provide foundational knowledge and practical resources on scam and check fraud tactics, empowering payments professionals to recognize, prevent, and collaborate on defense
Federal Reserve has released two new toolkits: the Scams Mitigation Toolkit (Off-site) and Check Fraud Mitigation Toolkit (Off-site). The toolkits are intended to support education and increase awareness about scams and check fraud, enable the payments industry to better identify and fight them, and foster industry collaboration on fraud and scams mitigation. The initial releases of the Scams Mitigation Toolkit and Check Fraud Mitigation Toolkit focus on building foundational knowledge about different types of scams and check fraud; the tactics and human vulnerabilities that often enable these to succeed; and common scenarios that financial institutions, service providers, other businesses and individuals may encounter. In the fourth quarter of 2025, second releases of these two toolkits will offer additional insights and resources. These toolkits were developed by the Federal Reserve to help educate the industry about scams and check fraud. Insights for these toolkits were provided through interviews with industry experts, publicly available research and tea m member expertise. The toolkits are not intended to result in any regulatory or reporting requirements, imply any liabilities for fraud loss, or confer any legal status, legal definitions, or legal rights or responsibilities. While use of these toolkits throughout the industry is encouraged, their utilization is voluntary at the discretion of each individual entity. Absent written consent, the toolkits may not be used in a manner that suggests the Federal Reserve endorses a third-party product or service.
Experian’s document verification suite integrates Incode’s AI ID verification, liveness, facial match, and real‑time metadata analysis to speed decisions and block synthetic fraud
Experian announced the integration of Incode Technologies, Inc. (“Incode”) into the Experian Ascend Platform™. This collaboration will enable seamless, secure and efficient identity validation for over 1,800 global clients across industries including financial services, automotive, healthcare and digital marketing. Through this partnership, Incode’s advanced identity validation and real-time metadata analysis will be offered as an optional component within Experian’s CrossCore Document Verification suite in North America, with global expansion planned. Incode’s AI-driven technology strengthens Experian’s identity and fraud solutions by verifying and connecting identity elements such as government-issued IDs, facial recognition, liveness checks, and real time metadata. Identity verification is central to Experian’s identity and fraud portfolio, helping organizations combat cybercrime while maintaining a seamless customer experience. This integration provides stronger protection against synthetic identity and application fraud, as well as higher accuracy in detection and workforce identity.
Yubico’s Enhanced PIN feature to offer comprehensive PIN management for users with enforcement policies and PIN complexity applied by default, always-on user verification and minimum PIN length of six characters
Yubico has introduced the YubiKey 5 – Enhanced PIN, offering additional PIN capabilities for enterprises in 175 countries and 24 territories. The product is pre-configured with features to improve PIN management and user enforcement, including a mandatory minimum PIN length and requirements for increased complexity. This helps organizations meet evolving policy, compliance, and audit requirements for user authentication. The Enhanced PIN features are available on the YubiKey 5 NFC and YubiKey 5C NFC models, specifically through the YubiKey as a Service platform. The company has expanded its YubiKey as a Service to include all European Union countries and expanded its YubiEnterprise Delivery to 117 locations globally. The expanded service and new key features reflect Yubico’s effort to address the challenges posed by a changing cybersecurity landscape and varying global regulatory requirements, supporting enterprise customers in their transition to more robust authentication systems.
Legion Security’s lightweight browser extension learns directly from SOC analysts by observing their day-to-day investigation, records how they handle alerts and make decisions and translates them into scalable, automated workflows cutting investigation and response times by up to 90%
Browser-native AI security operations center startup Legion Security differs from existing solutions on the market through the use of a lightweight browser extension that learns directly from analysts by observing their day-to-day investigations. The idea is to allow the platform to capture the nuances of human expertise and translate them into scalable, automated workflows tailored to each organization’s unique tools and processes. Legion uses a three-phase operational model that moves from passive observation to full automation. In the initial “Learning Mode,” the platform shadows senior analysts and records how they handle alerts and make decisions. The next step, the “Guided Mode,” offers suggestions and performs tasks under human supervision. Finally, when teams are ready, an “Autonomous Mode” allows Legion to act independently or with selective approvals, drastically accelerating response times and reducing manual workload without sacrificing oversight. Analysts can configure exactly when and where Legion operates, restrict its access to certain tools and mask sensitive data during sessions. Every action taken by the AI is fully auditable and security teams retain final say over what is learned, applied or deployed. The offering from Legion is positioned to solve a longstanding pain point in cybersecurity: the overwhelming volume of alerts and the shortage of qualified personnel to investigate them. By converting institutional knowledge into actionable automation, the platform helps reduce triage time, cut down on false positives and eliminate repetitive documentation work. “What sets Legion apart is its browser-native AI platform,” said Sri Viswanath, managing director at Coatue. “It studies how security analysts work and instantly scales those workflows, cutting investigation and response times by up to 90%.”
Quantum-Safe 360 Alliance publishes white paper, guiding enterprises through PQC migration with best practices, crypto-agile strategies, and expertise from Keyfactor, IBM, Thales, and Quantinuum
The Quantum-Safe 360 Alliance, including members Keyfactor, IBM Consulting, Thales, and Quantinuum, unveiled its first comprehensive guide to help organizations navigate the global transition to post-quantum cryptography (PQC). The white paper marks the formal debut of the Quantum-Safe 360 Alliance, an evolving collective of industry leaders with unparalleled expertise spanning cryptographic design and deployment, public key infrastructure (PKI) and certificate lifecycle management, crypto-agile development practices, and quantum-safe cryptography. Collaborating to help enterprises tackle the challenges of PQC transitions, the Alliance’s white paper signals a coordinated, public effort to provide clear guidance and accelerate preparedness for the quantum era. Drawing upon each Alliance member’s deep proficiency and diverse capabilities, the white paper highlights the urgency of quantum-safe preparedness and the risks of inaction and provides actionable guidance on building stronger crypto-agility and starting PQC transitions. Formed to promote a unified, cross-industry approach, the Alliance aims to provide coordinated expertise and interoperable solutions to help enterprises safeguard data in the quantum era. By pooling resources and knowledge, the Alliance aims to help enterprises navigate the quantum era, including supplying organizations with cybersecurity best practices and interoperable solutions designed to work cohesively across platforms and industries. Key topics the white paper addresses include: The necessity of cryptographic agility to adapt to evolving threats; The challenges enterprises face in securing internal buy-in for PQC and strategies to overcome them; Case studies highlighting the value of holistic post-quantum preparation guided by the expertise and skills of Alliance members; A strategic roadmap for enterprises to adopt cryptographic agility; and, Best practices and tools for implementing a quantum-safe infrastructure, including PKI management, key lifecycle strategies, and quantum-generated randomness for enhanced security.
Circle and Paxos pilot “know‑your‑issuer” with Bluprynt to trace tokens to verified issuers, curbing counterfeit stablecoins and aiding auditors and regulators amid new U.S. rules
Stablecoin heavyweights Circle Internet Group Inc. and Paxos Trust Co. have piloted a new way to prevent copycats and help companies verify their digital asset holdings. The firms partnered with Bluprynt, a fintech startup using cryptography and blockchain technology to provide issuer verification when stablecoins are released by a company. The pilot provided a way to trace back a token to the verified issuer, using Bluprynt’s technology. Bluprynt’s technology gives “provenance upfront, reducing complexity, and providing regulators and investors with the transparency they need.” He noted that could help curb losses due to counterfeit tokens and impersonation attacks. It’s another sign that parts of the digital asset industry are maturing as they seek to meet new regulatory requirements being established in jurisdictions across the globe. Stablecoins are digital assets pegged to non-volatile assets, such as US dollars, and can be used as a cash equivalent for payments. The technology could benefit auditors, financial crime-fighters, and investors. Circle’s USDC is the second-largest stablecoin by market value, and Paxos issues and operates the blockchain infrastructure behind PayPal Inc.’s stablecoin, PYUSD. The number of firms offering stablecoins is expected to grow with the recently-enacted GENIUS Act, which provides a framework for dollar-backed stablecoins.
Akeyless enables AI agents to authenticate using dynamic, just-in-time verifiable machine identities such as cloud IAM roles eliminating the need to embed secrets in code, containers, or pipelines
Akeyless, the Unified Secrets & Machine Identity Platform for the AI-driven Era, announced the launch of Akeyless SecretlessAI, a breakthrough solution purpose-built to secure the rapidly expanding universe of AI agents and Model Context Protocol (MCP) servers. Akeyless SecretlessAI™ eliminates the need to embed secrets in code, containers, or pipelines. Instead, it introduces dynamic, just-in-time secrets provisioning, where AI agents and MCP servers authenticate using verifiable machine identities — such as cloud IAM roles or Kubernetes service accounts. Akeyless extends traditional secrets management by integrating with advanced identity frameworks like SPIFFE (Secure Production Identity Framework for Everyone) through its SPIRE plugins, enabling a ‘secretless’ authentication model for workloads. Additionally, Akeyless offers built-in PKI-as-a-Service capabilities that automate the lifecycle of certificates, including issuance, renewal, and revocation, all within a secure and scalable SaaS platform. Based on centrally managed policies, Akeyless provisions ephemeral, tightly scoped secrets at runtime. This approach drastically reduces the window of compromise and supports Zero Trust and Least Privilege principles. The solution offers comprehensive auditing and centralized governance, providing visibility into every request and action. It enables policy-based access control and full lifecycle automation, empowering security and DevOps teams to enforce compliance without slowing innovation.