NDR and EDR: Necessary Defenses against the Evolution of AI Threats

Cybersecurity faces a constant challenge: innovation from adversaries. The rise of offensive artificial intelligence (AI) is transforming attack strategies, making them harder to detect. Threat actors use large language models (LLMs) to hide code and generate malicious scripts on the fly. These attacks demonstrate unprecedented sophistication and expose the limitations of traditional defenses. In this new landscape, relying solely on Endpoint Detection and Response (EDR) is insufficient. Combining EDR with Network Detection and Response (NDR) has become essential to counter modern threats. ...

January 27, 2026 · Comfidentia

Risks of AI chatbots for children and how to mitigate them

The use of artificial intelligence (AI) chatbots has become widespread rapidly, with platforms like ChatGPT reaching hundreds of millions of users, many of them young people. A 2025 UK study revealed that almost two-thirds (64%) of children use these tools. Despite its popularity, the frequent use of generative AI (GenAI) by children raises legitimate safety, privacy and psychological concerns, especially because protection policies do not evolve as quickly as the technology. ...

January 26, 2026 · Comfidentia

AI Agent Orchestrates First Autonomous Cyberattack: Implications for SaaS Security

The GTG-1002 Attack: The First Autonomous Cyberspace Campaign In November 2025, Anthropic revealed details of an unprecedented cyberespionage campaign, dubbed GTG-1002. This was the first time a case of an artificial intelligence (AI) agent orchestrating real-world intrusions with minimal human intervention was documented. A Chinese state-sponsored group manipulated an Anthropic Code Assistant to run approximately 80% of a multi-target hacking campaign autonomously. Instead of simply advising cybercriminals, AI took control of key phases of the operation, including: ...

December 9, 2025 · Comfidentia

More than 30 vulnerabilities discovered in IDEs with AI that allow data theft and RCE

A recent investigation has revealed more than 30 security vulnerabilities in several Integrated Development Environments (IDEs) powered by artificial intelligence (AI). These flaws, collectively called “IDEsaster”, combine prompt injection primitives with legitimate IDE features to achieve data exfiltration and remote code execution (RCE). Security researcher Ari Marzouk (MaccariTA) discovered that the vulnerabilities affect popular IDEs and extensions such as Cursor, Windsurf, Kiro.dev, GitHub Copilot, Zed.dev, Roo Code, Junie and Cline, among others. Of these, 24 vulnerabilities have been given CVE identifiers. ...

December 6, 2025 · Comfidentia
Español English