Recommended for you
![[object Object]](https://a.storyblok.com/f/285531722701318/698x308/c240c28be8/ai_abuse_04.png)
The Rise of AI Abuse:A story of Criminal GPTs, DeepFakes, Data Breaches, AI Malware, and Agentic Sleeper Agents
This post explores how attackers have been adopting AI technologies, how it’s reshaped the cyber threat landscape, and w...
![[object Object]](https://a.storyblok.com/f/285531722701318/1599x824/6b817864df/operator_image_01.png)
The Offensive Potential of Computer-Using Agents
Computer-Using Agents (CUAs), while intended to increase productivity, can be repurposed by threat actors for malicious...
![[object Object]](https://a.storyblok.com/f/285531722701318/7500x4500/03e9e11ee4/pexels-googledeepmind-17485632.jpg)
6 Strategic Implications of AI for Security Leaders in 2026
Most organisations think they control AI usage. They don’t. Discover 6 strategic implications security leaders must addr...