Aggregator
中国首次发射应急飞船神舟二十二号
New FlexibleFerret Malware Chain Targets macOS With Go Backdoor
第八届“强网”拟态防御国际精英挑战赛 - WIN!致敬mt 复现
Defensie onderstreept noodzaak van campagne tegen geweld tegen vrouwen
CVE-2025-65498 | obgm libcoap 4.3.5 DTLS src/coap_openssl.c coap_dtls_generate_cookie null pointer dereference (Nessus ID 276675)
CVE-2025-65499 | obgm libcoap 4.3.5 DTLS src/coap_openssl.c tls_verify_call_back denial of service (Nessus ID 276674)
CVE-2025-65497 | obgm libcoap 4.3.5 DTLS src/coap_openssl.c coap_dtls_generate_cookie null pointer dereference (Nessus ID 276676)
CVE-2025-65500 | obgm libcoap 4.3.5 DTLS src/coap_openssl.c coap_dtls_generate_cookie null pointer dereference (Nessus ID 276677)
Скачал модель — потерял всё: как бесплатные ассеты в Blender воруют ваши пароли
CISA Warns of Threat Actors Leveraging Commercial Spyware to Target Users of Signal and WhatsApp
Cybersecurity authorities have raised fresh alarms over the spread of advanced commercial spyware targeting secure messaging apps like Signal and WhatsApp. According to a recent CISA advisory, multiple cyber threat actors actively deploy this sophisticated malware to compromise users’ smartphones, using methods designed to bypass established security protections. These threats first emerged in 2025, with […]
The post CISA Warns of Threat Actors Leveraging Commercial Spyware to Target Users of Signal and WhatsApp appeared first on Cyber Security News.
冰箱彩电大沙发不能代表的智能座舱,应该什么样?
Thinking Beyond Price: What Tech Teams Should Look for in a Hosting Provider
Telecommunications Network Security: Defending Against Nation State APTs with Unified AI Defense
The global telecommunications ecosystem has entered its most dangerous cyber era.As 5G, O RAN, cloud workloads, and massive IoT ecosystems expand, telecom networks have become the number one target for nation-state APTs. Attacks like Salt Typhoon, labeled the worst telecom breach in U.S. history, prove one reality: Traditional enterprise security tools cannot defend networks operating
The post Telecommunications Network Security: Defending Against Nation State APTs with Unified AI Defense appeared first on Seceon Inc.
The post Telecommunications Network Security: Defending Against Nation State APTs with Unified AI Defense appeared first on Security Boulevard.
CVE-2025-64446
CVE-2025-4123
Find the Invisible: Salt MCP Finder Technology for Proactive MCP Discovery
The conversation about AI security has shifted.
For the past year, the focus has been on the model itself: poisoning data, prompt injection, and protecting intellectual property. These are critical concerns, but they miss the bigger picture of how AI is actually being operationalized in the enterprise.
We are entering the era of Agentic AI. AI is no longer just generating text; it is taking action. Autonomous agents read customer tickets, query databases, update financial records, and trigger workflows.
To do this, they rely on a new, critical piece of infrastructure: Model Context Protocol (MCP) servers.
These servers are the "connective tissue" of the agentic future. They are the bridge between your LLMs and your most sensitive internal systems. And right now, for most security teams, they are completely invisible.
The Rise of the AI Action LayerThis new infrastructure, the ecosystem of MCP servers, agents, and the tools they expose, forms what we call the Agentic AI Action Layer.
It is powerful, flexible, and rapidly multiplying. Developers are spinning up MCP servers to connect copilots to internal tools. Marketing teams are using them to automate campaigns.
But this speed comes with a massive blind spot.
Tech providers and enterprises are largely unprepared for this surge in machine-to-machine interaction. As Gartner notes: "Most tech providers remain unprepared for the surge in agent-driven API usage. Gartner predicts that by 2028, 80% of organizations will see AI agents consume the majority of their APIs, rather than human developers."*
This creates a dangerous gap. If you don’t know where your MCP servers are, what tools they expose, or who configured them, you cannot secure them. You are effectively blind to a major new class of access pathways into your organization.
Introducing Salt MCP Finder Technology: A System of Record for AIToday, we are proud to announce Salt MCP Finder Technology, the industry's first centralized system of record for the Agentic AI Action Layer.
We built MCP Finder Technology to answer the fundamental questions CISOs ask: Where are my MCP servers? What data can they access? Are they secure?
It consolidates discovery from every stage of the lifecycle, external, code, and runtime, into a single, authoritative inventory.
The Salt Discovery Engine: Three Steps to Full VisibilityTo build this complete picture, Salt MCP Finder Technology leverages a unique, three-pronged discovery engine that secures every stage of the lifecycle:
1. External Exposure (Salt Surface): The first step is securing your perimeter. We identify forgotten or zombie MCP servers exposed to the public internet, allowing you to close immediate gaps that attackers could exploit.
- Why it matters: Attackers constantly scan your perimeter. Surface finds the MCP servers your team spun up and forgot about before they become an entry point.
2. Code (GitHub Connect): The proactive step. We scan private repositories to find MCP blueprints and shadow integrations before they are deployed. This "shift-left" visibility allows you to catch misconfigurations at the source.
3. Runtime (Agentic AI): The continuous step. We monitor live traffic to observe the actual behavior of AI agents, tool usage, and data flow. This ensures that the runtime environment aligns with your security policy.
By combining these three views, external, code, and runtime, Salt MCP Finder Technology provides the only complete system of record for the Agentic AI Action Layer.
From Discovery to GovernanceVisibility is only the first step. To secure the Agentic AI Action Layer, you need control.
Salt MCP Finder Technology doesn't just list your servers; it governs them. It automatically maps the tools and data sources exposed by each MCP server and evaluates them against a robust set of AI Posture Policies.
For example, you can instantly flag any MCP server that:
- Is exposed to the public internet (found by Surface).
- Returns sensitive PII or financial data.
- Uses unauthenticated tool definitions.
This allows you to move from manual, spreadsheet-based tracking to automated, continuous policy enforcement.
Secure the Future of WorkThe shift to agentic AI is as significant as the shift to cloud or mobile. It requires a new approach to security, one that understands the unique language and risks of AI agents.
With Salt MCP Finder Technology, security teams finally get a seat at the table. You can enable your organization to innovate with AI agents, confident that you have the visibility and control to keep them secure.
Don't let the surge of AI agents outpace your security. See the Agentic AI Action Layer with Salt MCP Finder Technology by booking a demo with us today.
If you want to learn more about Salt and how we can help you, please contact us, schedule a demo, or visit our website. You can also get a free API Attack Surface Assessment from Salt Security's research team and learn what attackers already know.
*Source: Gartner Research, Protect Your Customers: Next-Level Agentic AI With Model Context Protocol, By Adrian Lee, Marissa Schmidt, November 2025.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.
The post Find the Invisible: Salt MCP Finder Technology for Proactive MCP Discovery appeared first on Security Boulevard.