Recommended for you
![[object Object]](https://a.storyblok.com/f/285531722701318/698x308/c240c28be8/ai_abuse_04.png)
The Rise of AI Abuse:A story of Criminal GPTs, DeepFakes, Data Breaches, AI Malware, and Agentic Sleeper Agents
This post explores how attackers have been adopting AI technologies, how it’s reshaped the cyber threat landscape, and w...
![[object Object]](https://a.storyblok.com/f/285531722701318/1599x824/6b817864df/operator_image_01.png)
The Offensive Potential of Computer-Using Agents
Computer-Using Agents (CUAs), while intended to increase productivity, can be repurposed by threat actors for malicious...
![[object Object]](https://a.storyblok.com/f/285531722701318/2513x1218/11c2474546/htm_image_02.png)
Introducing The Human Threat Map: Mapping and Defending the Human Perimeter
To help organisations understand and contextualise how human behaviours create risks and enable threats we have released...