<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CyberAid</title>
	<atom:link href="https://cyberaidproject.eu/feed/" rel="self" type="application/rss+xml" />
	<link>https://cyberaidproject.eu/</link>
	<description></description>
	<lastBuildDate>Thu, 02 Apr 2026 10:15:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://cyberaidproject.eu/wp-content/uploads/2026/02/favicon.png</url>
	<title>CyberAid</title>
	<link>https://cyberaidproject.eu/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>New Publication: “Cyber Resilience as a Competitive Advantage: How JRC Capital Prepares for the Future of Algorithmic Trading”</title>
		<link>https://cyberaidproject.eu/videos/general/new-scientific-article-cyber-resilience-as-a-competitive-advantage-how-jrc-capital-prepares-for-the-future-of-algorithmic-trading/</link>
		
		<dc:creator><![CDATA[elina]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 10:35:05 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Meeting]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://cyberaidproject.eu/?p=4923</guid>

					<description><![CDATA[<p>Get the latest insights, market trends &amp; inspiration!</p>
<p>The post <a href="https://cyberaidproject.eu/videos/general/new-scientific-article-cyber-resilience-as-a-competitive-advantage-how-jrc-capital-prepares-for-the-future-of-algorithmic-trading/">New Publication: “Cyber Resilience as a Competitive Advantage: How JRC Capital Prepares for the Future of Algorithmic Trading”</a> appeared first on <a href="https://cyberaidproject.eu">CyberAid</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top-small:40px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1256.6px;margin-left: calc(-3% / 2 );margin-right: calc(-3% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-size:cover;--awb-width-large:100%;--awb-spacing-right-large:1.455%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.455%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.455%;--awb-spacing-left-medium:1.455%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.455%;--awb-spacing-left-small:1.455%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-1 fusion-text-no-margin" style="--awb-margin-bottom:40px;"><p style="font-weight: 400;">The CyberAId Project recently highlighted a new publication entitled <strong>“Cyber Resilience as a Competitive Advantage: How JRC Capital Prepares for the Future of Algorithmic Trading”.</strong></p>
<p style="font-weight: 400;">The publication by <a href="https://jrconline.com/">JRC Capital</a> explores how cyber resilience is evolving from a defensive measure into a strategic differentiator in high-speed, algorithmic trading. It demonstrates how advanced technologies and AI-driven risk assessment strengthen operational reliability and support more informed, data-driven decision-making.</p>
<p style="font-weight: 400;">Since its release, the publication has been featured in more than <strong>65 German newspapers</strong>, showcasing the relevance of cyber resilience research and the role of the CyberAId Project in advancing secure and resilient financial markets.</p>
</div><div style="text-align:center;"><a class="fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type" target="_self" href="https://cyberaidproject.eu/blog/cyber-resilience-as-a-competitive-advantage-how-jrc-capital-prepares-for-the-future-of-algorithmic-trading/"><span class="fusion-button-text awb-button__text awb-button__text--default">Read more</span></a></div></div></div></div></div>
<p>The post <a href="https://cyberaidproject.eu/videos/general/new-scientific-article-cyber-resilience-as-a-competitive-advantage-how-jrc-capital-prepares-for-the-future-of-algorithmic-trading/">New Publication: “Cyber Resilience as a Competitive Advantage: How JRC Capital Prepares for the Future of Algorithmic Trading”</a> appeared first on <a href="https://cyberaidproject.eu">CyberAid</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Resilience as a Competitive Advantage: How JRC Capital Prepares for the Future of Algorithmic Trading</title>
		<link>https://cyberaidproject.eu/blog/cyber-resilience-as-a-competitive-advantage-how-jrc-capital-prepares-for-the-future-of-algorithmic-trading/</link>
		
		<dc:creator><![CDATA[elina]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 10:14:58 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://cyberaidproject.eu/?p=4916</guid>

					<description><![CDATA[<p>Algorithmic and high-speed trading have become integral parts of modern financial markets. Trading decisions are increasingly automated, data-driven, and executed at machine speed. While this enables greater efficiency and liquidity, it also introduces new forms of digital risk. Cyber threats, system disruptions, and data integrity issues can directly impact financial performance and market stability.  [...]</p>
<p>The post <a href="https://cyberaidproject.eu/blog/cyber-resilience-as-a-competitive-advantage-how-jrc-capital-prepares-for-the-future-of-algorithmic-trading/">Cyber Resilience as a Competitive Advantage: How JRC Capital Prepares for the Future of Algorithmic Trading</a> appeared first on <a href="https://cyberaidproject.eu">CyberAid</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1256.6px;margin-left: calc(-3% / 2 );margin-right: calc(-3% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.455%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.455%;--awb-width-medium:100%;--awb-spacing-right-medium:1.455%;--awb-spacing-left-medium:1.455%;--awb-width-small:100%;--awb-spacing-right-small:1.455%;--awb-spacing-left-small:1.455%;"><div class="fusion-column-wrapper fusion-flex-justify-content-center fusion-content-layout-column"><div class="fusion-text fusion-text-2"><p>Algorithmic and high-speed trading have become integral parts of modern <strong>financial markets</strong>. Trading decisions are increasingly automated, data-driven, and executed at machine speed. While this enables greater efficiency and liquidity, it also introduces new forms of <strong>digital risk</strong>. Cyber threats, system disruptions, and data integrity issues can directly impact financial performance and market stability.</p>
<p>In this environment, <strong>cyber resilience</strong> is no longer just an IT concern, it is a core business capability. Financial institutions must ensure that their digital infrastructures remain <strong>reliable, secure, and</strong> <strong>adaptable,</strong> even under adverse conditions. This requires not only technical protection mechanisms,<br />
but also organizational maturity, continuous monitoring, and the ability to respond to incidents quickly and effectively.</p>
<p><a href="https://jrconline.com/">JRC Capital</a>, a research-oriented investment firm, addresses these challenges by actively participating in the European research initiative CyberAId. Through this collaboration, JRC Capital contributes practical <strong>financial market expertise</strong> while gaining access to innovative approaches in cyber resilience, digital risk management, and the use of artificial intelligence (AI) in security-critical processes.</p>
<p>Rather than focusing solely on defensive security, the <strong>CyberAId framework</strong> promotes a holistic perspective: understanding systemic risks, strengthening operational robustness, and improving decision-making under uncertainty. A key element is the use of AI to analyze complex data sets,<br />
detect patterns at an early stage, and support management with more informed, data-driven decisions. For JRC Capital, this means embedding both cyber resilience and AI into its strategic vision and operational culture.</p>
<p>The value of being part of CyberAId is reflected in three main strategic dimensions. The first is strategic foresight. JRC Capital benefits from early insights into emerging cyber risks in financial markets, supported by <strong>AI-driven analyses</strong> that help identify trends, dependencies, and potential vulnerabilities. This enables the firm to anticipate future challenges and align its long-term <strong>technology, governance, and investment strategies</strong> accordingly, transforming cyber resilience from a reactive necessity into a proactive capability.</p>
<p>The second dimension is <strong>innovation and learning</strong>. CyberAId creates a collaborative environment in which financial institutions, research organizations, and technology experts exchange knowledge and develop new resilience concepts. The integration of AI opens new possibilities, such as intelligent risk analysis, scenario simulations, and enhanced decision support. Through this ecosystem, JRC Capital gains access to advanced methodologies and best practices that go beyond traditional cybersecurity models and <strong>foster continuous organizational learning.</strong></p>
<p>The third dimension is <strong>credibility and trust</strong>. Active involvement in a European research initiative, combined with the responsible use of AI in the context of cyber resilience, signals a strong commitment to <strong>digital responsibility, transparency, and operational excellence</strong>. This strengthens JRC’s positioning as a forward-looking market participant that takes systemic digital risks seriously and leverages modern technologies to support the stability and integrity of the financial system. In an increasingly interconnected financial landscape, resilience is becoming a true <strong>competitive</strong> <strong>advantage</strong>. Institutions that invest early in the combined development of cyber resilience and AI capabilities are better positioned to maintain stability, protect investor interests, and operate sustainably in volatile market environments.</p>
<p>By engaging in CyberAId, JRC Capital is not only strengthening its own cyber resilience, but also contributing to a <strong>broader ecosystem</strong> that aims to make financial markets more robust, intelligent, and future-proof.</p>
</div><div class="awb-gallery-wrapper awb-gallery-wrapper-1 button-span-no" style="--more-btn-alignment:center;"><div style="margin:-5px;--awb-bordersize:0px;" class="fusion-gallery fusion-gallery-container fusion-grid-1 fusion-columns-total-1 fusion-gallery-layout-grid fusion-gallery-1"><div style="padding:5px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-1 hover-type-none awb-imageframe-style awb-imageframe-style-below awb-imageframe-style-1"><div class="fusion-gallery-image"><a href="https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-26-9.54.57-μμ.png" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img fetchpriority="high" decoding="async" src="https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-26-9.54.57-μμ.png" width="1208" height="804" alt="" title="Στιγμιότυπο οθόνης 2026-03-26, 9.54.57 μμ" aria-label="Στιγμιότυπο οθόνης 2026-03-26, 9.54.57 μμ" class="img-responsive wp-image-4917" srcset="https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-26-9.54.57-μμ-200x133.png 200w, https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-26-9.54.57-μμ-400x266.png 400w, https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-26-9.54.57-μμ-600x399.png 600w, https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-26-9.54.57-μμ-800x532.png 800w, https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-26-9.54.57-μμ-1200x799.png 1200w, https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-26-9.54.57-μμ.png 1208w" sizes="(min-width: 2200px) 100vw, (min-width: 640px) 1220px, " /></a></div><div class="awb-imageframe-caption-container" style="text-align:center;"><div class="awb-imageframe-caption"><h2 class="awb-imageframe-caption-title">CyberAId</h2></div></div></div><div class="clearfix"></div></div></div></div></div></div></div>
<p>The post <a href="https://cyberaidproject.eu/blog/cyber-resilience-as-a-competitive-advantage-how-jrc-capital-prepares-for-the-future-of-algorithmic-trading/">Cyber Resilience as a Competitive Advantage: How JRC Capital Prepares for the Future of Algorithmic Trading</a> appeared first on <a href="https://cyberaidproject.eu">CyberAid</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Seven Specialists: How CyberAId Thinks Like A Security Team</title>
		<link>https://cyberaidproject.eu/blog/the-seven-specialists-how-cyberaid-thinks-like-a-security-team/</link>
		
		<dc:creator><![CDATA[elina]]></dc:creator>
		<pubDate>Mon, 23 Mar 2026 13:55:38 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://cyberaidproject.eu/?p=4895</guid>

					<description><![CDATA[<p>A financial institution is breached. Somewhere in a stack of 10,000 alerts generated overnight, the signal exists. The SIEM flagged it. The XDR flagged it. No one saw it, because no one can see 10,000 alerts and reason across them simultaneously while the tools that generated them cannot reason at all.  This is not  [...]</p>
<p>The post <a href="https://cyberaidproject.eu/blog/the-seven-specialists-how-cyberaid-thinks-like-a-security-team/">The Seven Specialists: How CyberAId Thinks Like A Security Team</a> appeared first on <a href="https://cyberaidproject.eu">CyberAid</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1256.6px;margin-left: calc(-3% / 2 );margin-right: calc(-3% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.455%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.455%;--awb-width-medium:100%;--awb-spacing-right-medium:1.455%;--awb-spacing-left-medium:1.455%;--awb-width-small:100%;--awb-spacing-right-small:1.455%;--awb-spacing-left-small:1.455%;"><div class="fusion-column-wrapper fusion-flex-justify-content-center fusion-content-layout-column"><div class="fusion-text fusion-text-3"><p><span data-contrast="auto">A financial institution is breached. Somewhere in a stack of 10,000 alerts generated overnight, the signal exists. The SIEM flagged it. The XDR flagged it. No one saw it, because no one can see 10,000 alerts and reason across them simultaneously while the tools that generated them cannot reason at all.</span><span data-ccp-props="{"> </span></p>
<p><span data-contrast="auto">This is not a staffing problem. It is an architecture problem.</span><span data-ccp-props="{"> </span></p>
<p><span data-contrast="auto">The Security Operations Center was designed around the human analyst as the reasoning unit and the SIEM as the data aggregator. That model is collapsing under its own weight. According to CardinalOps&#8217; 2025 Annual Report, enterprise SIEMs cover only </span><b><span data-contrast="auto">21% of MITRE ATT&amp;CK techniques</span></b><span data-contrast="auto"> despite ingesting data that could theoretically cover 90%. The SANS 2025 SOC Survey found that </span><b><span data-contrast="auto">66% of teams cannot keep pace</span></b><span data-contrast="auto"> with alert volumes, and the Verizon 2024 DBIR noted that 74% of breaches had alerts that were generated but ignored. The analysts exist. The data exists. The gap is reasoning capacity.</span><span data-ccp-props="{"> </span></p>
<p><span data-contrast="auto">Generative AI has been proposed as the fix but adding a single <strong>large language model (LLM)</strong> to a SIEM simply relocates the bottleneck. A monolithic LLM asked to analyse a complex incident across network telemetry, vulnerability context, user behaviour, and regulatory obligations simultaneously will hallucinate, truncate, or generalise. A 2025 study demonstrated that GPT-class models failed to flag </span><i><span data-contrast="auto">any</span></i><span data-contrast="auto"> of 100 fabricated CVE-IDs as invalid, generating plausible-looking advisories for nonexistent vulnerabilities. A single model doing everything does nothing well. </span><span data-contrast="auto">The answer is not a smarter tool. It is a smarter team.</span><span data-ccp-props="{"> </span></p>
</div><div class="awb-gallery-wrapper awb-gallery-wrapper-2 button-span-no" style="--more-btn-alignment:center;"><div style="margin:-5px;--awb-bordersize:0px;" class="fusion-gallery fusion-gallery-container fusion-grid-1 fusion-columns-total-1 fusion-gallery-layout-grid fusion-gallery-2"><div style="padding:5px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-1 hover-type-none awb-imageframe-style awb-imageframe-style-below awb-imageframe-style-2"><div class="fusion-gallery-image"><a href="https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-24-12.34.49-πμ.png" rel="noreferrer" data-rel="iLightbox[gallery_image_2]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-24-12.34.49-πμ.png" width="1608" height="758" alt="" title="Στιγμιότυπο οθόνης 2026-03-24, 12.34.49 πμ" aria-label="Στιγμιότυπο οθόνης 2026-03-24, 12.34.49 πμ" class="img-responsive wp-image-4912" srcset="https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-24-12.34.49-πμ-200x94.png 200w, https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-24-12.34.49-πμ-400x189.png 400w, https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-24-12.34.49-πμ-600x283.png 600w, https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-24-12.34.49-πμ-800x377.png 800w, https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-24-12.34.49-πμ-1200x566.png 1200w, https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-24-12.34.49-πμ.png 1608w" sizes="(min-width: 2200px) 100vw, (min-width: 640px) 1220px, " /></a></div><div class="awb-imageframe-caption-container" style="text-align:center;"><div class="awb-imageframe-caption"><h2 class="awb-imageframe-caption-title">Picture 1</h2><p class="awb-imageframe-caption-text">The CyberAId LLM Orchestration Layer, showing the dual-orchestrator model (Central Router Agent and Reporting Agent), the seven domain agents, shared knowledge infrastructure, and the cross-cutting concerns of Security Context propagation, Guardrails, and Observability. </p></div></div></div><div class="clearfix"></div></div></div></div></div></div></div><div class="fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1256.6px;margin-left: calc(-3% / 2 );margin-right: calc(-3% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.455%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.455%;--awb-width-medium:100%;--awb-spacing-right-medium:1.455%;--awb-spacing-left-medium:1.455%;--awb-width-small:100%;--awb-spacing-right-small:1.455%;--awb-spacing-left-small:1.455%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-4"><p><b><span data-contrast="auto">The Specialist Model</span></b><span data-ccp-props="{"> </span></p>
<p><span data-contrast="auto"><strong><span class="NormalTextRun SpellingErrorV2Themed SCXW195323614 BCX4">CyberAId&#8217;s</span> LLM Orchestration Layer</strong> is built around a core insight borrowed from how expert security teams operate: no single analyst is simultaneously a threat intelligence expert, a forensic investigator, a compliance officer, a vulnerability researcher, and a code auditor. Expertise is domain-specific, and effective coordination across domains is what produces sound security decisions.</span><span data-ccp-props="{"> </span></p>
<p><span data-contrast="auto">CyberAId implements this as seven specialised agents, each deployed as an independent MCP Server with its own system instructions, domain-specific knowledge partition, and toolset:</span><span data-ccp-props="{"> </span></p>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Threat Intelligence Agent</span></b><span data-contrast="auto"> — tracks indicators of compromise, maps adversary TTPs against MITRE ATT&amp;CK, correlates campaigns across CTI feeds (STIX/TAXII, ISAC sharing), and attributes threats to known actors.</span><span data-ccp-props="{"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">Vulnerability Assessment Agent</span></b><span data-contrast="auto"> — scores exploitability and impact using CVE/NVD data, cross-references patch availability, and prioritises remediation against the institution&#8217;s actual exposure profile.</span><span data-ccp-props="{"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="auto">Compliance Verification Agent</span></b><span data-contrast="auto"> — maintains awareness of DORA, GDPR, PCI DSS v4.0, and NIS2 obligations, mapping findings to specific regulatory requirements and generating audit-ready documentation.</span><span data-ccp-props="{"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{" data-aria-posinset="4" data-aria-level="1"><b><span data-contrast="auto">Behavioural Analysis Agent</span></b><span data-contrast="auto"> — runs UEBA logic against established baselines, identifies insider threats, and flags deviations that signature-based detection cannot surface.</span><span data-ccp-props="{"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{" data-aria-posinset="5" data-aria-level="1"><b><span data-contrast="auto">Incident Response Agent</span></b><span data-contrast="auto"> — executes structured containment playbooks, coordinates cross-system isolation actions, and manages recovery sequencing with full state tracking.</span><span data-ccp-props="{"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{" data-aria-posinset="6" data-aria-level="1"><b><span data-contrast="auto">Forensic Analysis Agent</span></b><span data-contrast="auto"> — reconstructs event timelines from heterogeneous log sources, preserves evidence chains, and produces findings in a format that meets legal and regulatory standards for digital forensics.</span><span data-ccp-props="{"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{" data-aria-posinset="7" data-aria-level="1"><b><span data-contrast="auto">DevSecOps &amp; Code Analysis Agent</span></b><span data-contrast="auto"> — performs static and dynamic code analysis, identifies introduced vulnerabilities, and validates SDLC compliance — connecting the development pipeline to the operational security posture.</span><span data-ccp-props="{"> </span></li>
</ul>
<p><span data-contrast="auto">Each agent is independently callable. Each produces output in a standardised Finding Schema that carries severity, a calibrated confidence score, evidence references, and recommended actions. This makes findings composable: the Central Router Agent (CRA) aggregates them across domains, resolves conflicts, and produces unified recommendations. Critically, the Reporting Agent can query domain agents directly without routing through the CRA, so compliance reporting and incident response can run concurrently without contention.</span><span data-ccp-props="{"> </span></p>
<p><span data-ccp-props="{"> </span></p>
<p aria-level="2"><b><span data-contrast="auto">Beyond Rules: How Agents Reason</span></b><span data-ccp-props="{"> </span></p>
<p><span data-contrast="auto">The gap between a SIEM correlation rule and an agent is the gap between pattern matching and analysis. A SIEM fires when a threshold is crossed. An agent reasons about </span><i><span data-contrast="auto">why</span></i><span data-contrast="auto"> the threshold was crossed, what context surrounds it, what the adversary&#8217;s likely objective is, and what the appropriate response is drawing on retrieved knowledge from MITRE ATT&amp;CK, live CTI feeds, and institution-specific operational history.</span><span data-ccp-props="{"> </span></p>
<p><span data-contrast="auto">This is grounded reasoning, not generation. Each agent operates a retrieval-augmented pipeline against a partitioned vector store. The Threat Intelligence Agent queries its own partition; the Compliance Agent queries a different one. Retrieval is scoped by Security Context, a structured object carrying tenant identity, user role, data classification level, and audit token, created at the API Gateway and enforced within each agent. Client A&#8217;s threat intelligence never bleeds into Client B&#8217;s analysis. Research from PNNL demonstrated that graph-augmented retrieval across CVE→CWE→CAPEC→ATT&amp;CK mappings enables agents to produce cross-framework correlations that LLMs without grounding structurally cannot.</span><span data-ccp-props="{"> </span></p>
</div><div class="awb-gallery-wrapper awb-gallery-wrapper-3 button-span-no" style="--more-btn-alignment:center;"><div style="margin:-5px;--awb-bordersize:0px;" class="fusion-gallery fusion-gallery-container fusion-grid-1 fusion-columns-total-1 fusion-gallery-layout-grid fusion-gallery-3"><div style="padding:5px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-1 hover-type-none awb-imageframe-style awb-imageframe-style-below awb-imageframe-style-3"><div class="fusion-gallery-image"><a href="https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-24-12.35.13-πμ.png" rel="noreferrer" data-rel="iLightbox[gallery_image_3]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-24-12.35.13-πμ.png" width="1648" height="1004" alt="" title="Στιγμιότυπο οθόνης 2026-03-24, 12.35.13 πμ" aria-label="Στιγμιότυπο οθόνης 2026-03-24, 12.35.13 πμ" class="img-responsive wp-image-4913" srcset="https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-24-12.35.13-πμ-200x122.png 200w, https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-24-12.35.13-πμ-400x244.png 400w, https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-24-12.35.13-πμ-600x366.png 600w, https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-24-12.35.13-πμ-800x487.png 800w, https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-24-12.35.13-πμ-1200x731.png 1200w, https://cyberaidproject.eu/wp-content/uploads/2026/03/Στιγμιότυπο-οθόνης-2026-03-24-12.35.13-πμ.png 1648w" sizes="(min-width: 2200px) 100vw, (min-width: 640px) 1220px, " /></a></div><div class="awb-imageframe-caption-container" style="text-align:center;"><div class="awb-imageframe-caption"><h2 class="awb-imageframe-caption-title">Picture 2</h2><p class="awb-imageframe-caption-text">The Canonical Agent Architecture template implemented by each of CyberAId's seven domain agents. Each agent combines Input Processing, an Agent Core with Reasoning Engine and Context Window Manager, Tool Integration, Knowledge Access via RAG, and Output Processing with Confidence Scoring and Data Leakage Prevention.</p></div></div></div><div class="clearfix"></div></div></div><div class="fusion-text fusion-text-5"><p aria-level="2"><strong>Tool Integration: MCP and CLI </strong></p>
<p><span data-contrast="auto">Agents interact with the security infrastructure through MCP Tool Servers — a layer that wraps existing services (SIEM/XDR, vulnerability scanners, risk assessment engines, CTI platforms) behind a standardised, auditable interface. MCP converts the integration problem from N×M to N+M, enables runtime tool discovery, and provides the access control and audit logging that regulated environments require.</span><span data-ccp-props="{"> </span></p>
<p><span data-contrast="auto">Where MCP overhead is a concern (i.e, high-frequency telemetry processing, deterministic forensic queries, time-critical containment operations) agents invoke security tooling directly via CLI interfaces. The pattern of wrapping tools like osquery, Nmap, or EDR CLIs as callable agent functions is well-established in production deployments and reduces latency without sacrificing the orchestration layer&#8217;s auditability. The architecture is pragmatic: MCP for flexible reasoning across services, direct invocation for throughput-sensitive operations.</span><span data-ccp-props="{"> </span></p>
<p><span data-ccp-props="{"> </span></p>
<p aria-level="2"><b><span data-contrast="auto">Trust Is Architectural, Not Optional</span></b><span data-ccp-props="{"> </span></p>
<p><span data-contrast="auto">Financial institutions operating under DORA face a 4-hour initial incident notification window. The EU AI Act classifies AI systems used in financial risk assessment as high-risk, triggering mandatory human oversight requirements under Article 14. These are not compatible with either a fully autonomous AI or a purely human SOC. They require </span><i><span data-contrast="auto">bounded autonomy</span></i><span data-contrast="auto">.</span><span data-ccp-props="{"> </span></p>
<p><span data-contrast="auto">CyberAId&#8217;s HITL architecture implements three tiers: routine reversible actions (known-indicator blocking, alert triage) run autonomously; the agent evaluates ambiguous situations against confidence thresholds and escalates if uncertain; high-severity actions (network segmentation changes, major incident declarations) require explicit analyst approval. Every decision (automated or human) is recorded with full provenance: what data was used, what reasoning was applied, which tools were called, and what the confidence score was at decision time.</span><span data-ccp-props="{"> </span></p>
<p><span data-contrast="auto">Guardrails operate at every agent boundary: prompt injection detection on input, output sanitisation and data leakage prevention before response. The vector stores that ground each agent are themselves security-sensitive partitioned, encrypted, and monitored for integrity, given demonstrated research that knowledge base poisoning attacks can achieve over 90% success rates against unprotected RAG systems.</span><span data-ccp-props="{"> </span></p>
<p><span data-ccp-props="{"> </span></p>
<p aria-level="2"><b><span data-contrast="auto">What This Changes</span></b><span data-ccp-props="{"> </span></p>
<p><span data-contrast="auto">The dominant approach to AI in security operations today is copilot integration: a single LLM added to an existing SIEM, assisting analysts with natural language queries. This is a useful productivity improvement that does not change the fundamental model. It still depends on analysts reviewing alerts at scale; it still lacks cross-domain synthesis; it still cannot produce the continuous, evidence-backed, compliance-mapped analysis that DORA and the EU AI Act increasingly require.</span><span data-ccp-props="{"> </span></p>
<p><span data-contrast="auto">CyberAId&#8217;s multi-agent architecture is a different proposal: not a smarter tool inside an existing workflow, but a different workflow where domain expertise is encoded in specialised agents, coordination is explicit and auditable, knowledge is grounded in authoritative sources, and human oversight is structural rather than procedural. The seven specialists do not replace the security team. They change what the security team is asked to do.</span><span data-ccp-props="{"> </span></p>
<p><span data-ccp-props="{"> </span></p>
<p aria-level="2"><b><span data-contrast="auto">References</span></b><span data-ccp-props="{"> </span></p>
<ol>
<li aria-setsize="-1" data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">CardinalOps. </span><i><span data-contrast="auto">5th Annual State of SIEM Detection Risk Report</span></i><span data-contrast="auto"> (2025). </span><span data-ccp-props="{"> </span></li>
</ol>
<ol>
<li aria-setsize="-1" data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">SANS Institute. </span><i><span data-contrast="auto">2025 SOC Survey.</span></i> <a href="https://www.sans.org/white-papers/sans-2025-soc-survey"><span data-contrast="none">https://www.sans.org/white-papers/sans-2025-soc-survey</span></a><span data-ccp-props="{"> </span></li>
</ol>
<ol>
<li aria-setsize="-1" data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Srinivas, Kirk, Zendejas et al. </span><i><span data-contrast="auto">AI-Augmented SOC: A Survey of LLMs and Agents for Security Automation</span></i><span data-contrast="auto"> (MDPI Journal of Cybersecurity and Privacy, November 2025). 40% reduction in false positives for insider threat detection. </span><a href="https://www.mdpi.com/2624-800X/5/4/95"><span data-contrast="none">https://www.mdpi.com/2624-800X/5/4/95</span></a><span data-ccp-props="{"> </span></li>
</ol>
<ol>
<li aria-setsize="-1" data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">arXiv. </span><i><span data-contrast="auto">Using LLMs for Security Advisory Investigations: How Far Are We?</span></i><span data-contrast="auto"> (2025). LLMs failed to flag fabricated CVE-IDs as invalid. </span><a href="https://arxiv.org/html/2506.13161v1"><span data-contrast="none">https://arxiv.org/html/2506.13161v1</span></a><span data-ccp-props="{"> </span></li>
</ol>
<ol>
<li aria-setsize="-1" data-leveltext="%1." data-font="Calibri" data-listid="3" data-list-defn-props="{" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">arXiv. </span><i><span data-contrast="auto">CyberRAG: An Agentic RAG Cyber Attack Classification and Reporting Tool</span></i><span data-contrast="auto"> (arXiv:2507.02424). 94.92% classification accuracy with domain-partitioned vector stores. </span><a href="https://arxiv.org/pdf/2507.02424"><span data-contrast="none">https://arxiv.org/pdf/2507.02424</span></a><span data-ccp-props="{"> </span></li>
</ol>
<ol>
<li aria-setsize="-1" data-leveltext="%1." data-font="Calibri" data-listid="3" data-list-defn-props="{" data-aria-posinset="6" data-aria-level="1"><span data-contrast="auto">Model Context Protocol. </span><i><span data-contrast="auto">Security Best Practices</span></i><span data-contrast="auto"> (Official Specification). </span><a href="https://modelcontextprotocol.io/specification/draft/basic/security_best_practices"><span data-contrast="none">https://modelcontextprotocol.io/specification/draft/basic/security_best_practices</span></a><span data-ccp-props="{"> </span></li>
</ol>
<ol>
<li aria-setsize="-1" data-leveltext="%1." data-font="Calibri" data-listid="3" data-list-defn-props="{" data-aria-posinset="7" data-aria-level="1"><span data-contrast="auto">Google Cloud. </span><i><span data-contrast="auto">The Dawn of Agentic AI in Security Operations</span></i><span data-contrast="auto"> — RSAC 2025. </span><a href="https://cloud.google.com/blog/products/identity-security/the-dawn-of-agentic-ai-in-security-operations-at-rsac-2025"><span data-contrast="none">https://cloud.google.com/blog/products/identity-security/the-dawn-of-agentic-ai-in-security-operations-at-rsac-2025</span></a><span data-ccp-props="{"> </span></li>
</ol>
</div></div></div></div></div></p>
<p>The post <a href="https://cyberaidproject.eu/blog/the-seven-specialists-how-cyberaid-thinks-like-a-security-team/">The Seven Specialists: How CyberAId Thinks Like A Security Team</a> appeared first on <a href="https://cyberaidproject.eu">CyberAid</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CyberAId Project at the EPSM Conference</title>
		<link>https://cyberaidproject.eu/videos/general/cyberaid-project-at-the-epsm-conference/</link>
		
		<dc:creator><![CDATA[elina]]></dc:creator>
		<pubDate>Thu, 19 Mar 2026 10:11:13 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Meeting]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://cyberaidproject.eu/?p=4878</guid>

					<description><![CDATA[<p>Get the latest insights, market trends &amp; inspiration!</p>
<p>The post <a href="https://cyberaidproject.eu/videos/general/cyberaid-project-at-the-epsm-conference/">CyberAId Project at the EPSM Conference</a> appeared first on <a href="https://cyberaidproject.eu">CyberAid</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top-small:40px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1256.6px;margin-left: calc(-3% / 2 );margin-right: calc(-3% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-size:cover;--awb-width-large:100%;--awb-spacing-right-large:1.455%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.455%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.455%;--awb-spacing-left-medium:1.455%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.455%;--awb-spacing-left-small:1.455%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-6 fusion-text-no-margin" style="--awb-margin-bottom:40px;"><div>
<p><span lang="EN-GB">The</span><span class="apple-converted-space"><span lang="EN-GB"> </span></span><strong><span lang="EN-GB">CyberAId</span></strong><span class="apple-converted-space"><span lang="EN-GB"> </span></span><span lang="EN-GB">project was successfully represented at the</span><span class="apple-converted-space"><span lang="EN-GB"> </span></span><strong><span lang="EN-GB">59th EPSM Meeting</span></strong><span lang="EN-GB">, held on March 12nd, 2026, in the</span><span class="apple-converted-space"><span lang="EN-GB"> </span></span><em><span lang="EN-GB">Reitersaal at the Österreichische Kontrollbank (ÖKB)</span></em><span class="apple-converted-space"><span lang="EN-GB"> </span></span><span lang="EN-GB">in Austria. The event, hosted by <a href="https://www.akela.law/">AKELA</a> and <a href="https://www.bluecode.com/en">Bluecode</a>, brought together 62 participants from 14 countries across the sector.</span></p>
</div>
<div>
<p><span lang="EN-GB">CyberAId was represented by its partner <a href="https://www.qubo.technology/">QUBO</a>, whose founders, Dr. Stefan Fürnsinn and Prof. Dr. Philip Walter, presented their solution, highlighting its key capabilities and real-world applications. In addition to the presentation, attendees had the opportunity to engage directly with the technology through a live demonstration at the booth.</span></p>
</div>
<div>
<p><span lang="EN-GB">The booth attracted strong interest, featuring an interactive setup where participants could watch and experience the solution hands-on. Positioned prominently between two display screens, the CyberAId flyer was showcased, providing visitors with further insights while they explored the demo environment.</span></p>
</div>
<div>
<p><span lang="EN-GB">The event offered a valuable opportunity to showcase CyberAId’s approach, exchange knowledge with industry professionals, and strengthen connections within the community.</span></p>
</div>
<p><img decoding="async" class=" wp-image-4879 aligncenter" src="https://cyberaidproject.eu/wp-content/uploads/2026/03/CyberAId-conferenence-300x169.jpg" alt="" width="710" height="400" srcset="https://cyberaidproject.eu/wp-content/uploads/2026/03/CyberAId-conferenence-200x113.jpg 200w, https://cyberaidproject.eu/wp-content/uploads/2026/03/CyberAId-conferenence-300x169.jpg 300w, https://cyberaidproject.eu/wp-content/uploads/2026/03/CyberAId-conferenence-400x225.jpg 400w, https://cyberaidproject.eu/wp-content/uploads/2026/03/CyberAId-conferenence-600x338.jpg 600w, https://cyberaidproject.eu/wp-content/uploads/2026/03/CyberAId-conferenence-768x432.jpg 768w, https://cyberaidproject.eu/wp-content/uploads/2026/03/CyberAId-conferenence-800x450.jpg 800w, https://cyberaidproject.eu/wp-content/uploads/2026/03/CyberAId-conferenence-1024x576.jpg 1024w, https://cyberaidproject.eu/wp-content/uploads/2026/03/CyberAId-conferenence-1200x675.jpg 1200w, https://cyberaidproject.eu/wp-content/uploads/2026/03/CyberAId-conferenence-1536x864.jpg 1536w, https://cyberaidproject.eu/wp-content/uploads/2026/03/CyberAId-conferenence.jpg 1920w" sizes="(max-width: 710px) 100vw, 710px" /></p>
</div></div></div></div></div>
<p>The post <a href="https://cyberaidproject.eu/videos/general/cyberaid-project-at-the-epsm-conference/">CyberAId Project at the EPSM Conference</a> appeared first on <a href="https://cyberaidproject.eu">CyberAid</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CyberAId Project Joins the ECSCI Cluster</title>
		<link>https://cyberaidproject.eu/videos/general/cyberaid-project-joins-the-ecsci-cluster/</link>
		
		<dc:creator><![CDATA[elina]]></dc:creator>
		<pubDate>Tue, 17 Mar 2026 11:42:19 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Meeting]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://cyberaidproject.eu/?p=4863</guid>

					<description><![CDATA[<p>Get the latest insights, market trends &amp; inspiration!</p>
<p>The post <a href="https://cyberaidproject.eu/videos/general/cyberaid-project-joins-the-ecsci-cluster/">CyberAId Project Joins the ECSCI Cluster</a> appeared first on <a href="https://cyberaidproject.eu">CyberAid</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top-small:40px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1256.6px;margin-left: calc(-3% / 2 );margin-right: calc(-3% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-size:cover;--awb-width-large:100%;--awb-spacing-right-large:1.455%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.455%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.455%;--awb-spacing-left-medium:1.455%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.455%;--awb-spacing-left-small:1.455%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-7 fusion-text-no-margin" style="--awb-margin-bottom:40px;"><p><span style="font-weight: 400;">The CyberAId project has officially joined the </span><b>European Cluster for Securing Critical Infrastructures (ECSCI)</b><span style="font-weight: 400;">. In the </span><b>ECSCI </b><span style="font-weight: 400;"> </span><b>65 EU-funded projects participated</b><span style="font-weight: 400;">, and continues to expand at an impressive pace!</span></p>
<p><span style="font-weight: 400;">By joining this collaborative network, CyberAId is connecting with other EU-funded projects to share technical insights and best practices in the field of critical infrastructure protection. This partnership will allow the project to participate in joint workshops and cross-project activities, ensuring that the cybersecurity tools we develop are well-aligned with the broader European innovation landscape.</span></p>
<p><span style="font-weight: 400;">You can find more information about the cluster and its members on the official website!</span></p>
<p><span style="font-weight: 400;">Stay tuned to learn more about the ECSCI updates!</span></p>
</div><div style="text-align:center;"><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-2 fusion-button-default-span fusion-button-default-type" style="--button_accent_color:#f4f4f4;--button_accent_hover_color:var(--awb-color1);--button_border_hover_color:var(--awb-color1);--button_gradient_top_color:var(--awb-color5);--button_gradient_bottom_color:var(--awb-color5);--button_gradient_top_color_hover:hsla(var(--awb-color5-h),var(--awb-color5-s),calc(var(--awb-color5-l) - 20%),var(--awb-color5-a));--button_gradient_bottom_color_hover:hsla(var(--awb-color5-h),var(--awb-color5-s),calc(var(--awb-color5-l) - 20%),var(--awb-color5-a));--button_text_transform:capitalize;" target="_self" href="https://www.ecsci.eu/"><span class="fusion-button-text awb-button__text awb-button__text--default">Learn more </span></a></div></div></div></div></div>
<p>The post <a href="https://cyberaidproject.eu/videos/general/cyberaid-project-joins-the-ecsci-cluster/">CyberAId Project Joins the ECSCI Cluster</a> appeared first on <a href="https://cyberaidproject.eu">CyberAid</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Multi-Agent Framework for Email Threat Detection pipeline in Financial Services</title>
		<link>https://cyberaidproject.eu/blog/a-multi-agent-framework-for-email-threat-detection-pipeline-in-financial-services/</link>
		
		<dc:creator><![CDATA[elina]]></dc:creator>
		<pubDate>Fri, 13 Mar 2026 13:09:57 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://cyberaidproject.eu/?p=4835</guid>

					<description><![CDATA[<p>The problem: why traditional email security falls short Imagine you’re a financial controller at a wealth management firm. Your CEO emails you at 4pm asking for an urgent EUR 20,000 wire transfer — confidential acquisition, don’t tell anyone, needs to go out today. The email passes your spam filter. SPF, DKIM, DMARC? The attacker  [...]</p>
<p>The post <a href="https://cyberaidproject.eu/blog/a-multi-agent-framework-for-email-threat-detection-pipeline-in-financial-services/">A Multi-Agent Framework for Email Threat Detection pipeline in Financial Services</a> appeared first on <a href="https://cyberaidproject.eu">CyberAid</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1256.6px;margin-left: calc(-3% / 2 );margin-right: calc(-3% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.455%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.455%;--awb-width-medium:100%;--awb-spacing-right-medium:1.455%;--awb-spacing-left-medium:1.455%;--awb-width-small:100%;--awb-spacing-right-small:1.455%;--awb-spacing-left-small:1.455%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-8"><h2 class="" style="--fontsize: 42; line-height: 1.3;" data-fontsize="42" data-lineheight="54.6px"><b>The problem: why traditional email security falls short</b></h2>
<p><span style="font-weight: 400;">Imagine you’re a financial controller at a wealth management firm. Your CEO emails you at 4pm asking for an urgent EUR 20,000 wire transfer — confidential acquisition, don’t tell anyone, needs to go out today. The email passes your spam filter. SPF, DKIM, DMARC? The attacker registered their own domain, so everything checks out. The display name says “John Smith CEO.” It looks real.</span></p>
<p><span style="font-weight: 400;">This is the reality of </span><strong>Business Email Compromise (BEC)</strong> <span style="font-weight: 400;">— the most financially damaging form of cyber attack targeting financial services today. Traditional rule-based filters were designed to catch spam and commodity phishing. They are not equipped to handle the kind of targeted, context-aware social engineering that wealth management firms face daily.</span></p>
<p>As part of the CyberAId project, <a href="https://www.kep.unipi.gr/">University of Piraeus Research Center (UPRC)</a> team has been working on a different approach. In close collaboration with our wealth management partner <a href="https://www.km3am.com/">KM CUBE Asset Management [KM3]</a>, who brought real-world operational insight into the kinds of attacks wealth managers actually encounter, we developed an EMTD (Email Threat Detection) pipeline — a multi-agent AI framework purpose-built for the financial sector.</p>
<h2 class="" style="--fontsize: 42; line-height: 1.3;" data-fontsize="42" data-lineheight="54.6px"><b>Architecture: A Five-Stage Detection Pipeline</b></h2>
<p><span style="font-weight: 400;">In <strong>Stage 1</strong>, eight deterministic pre-checks execute, validating email authentication (SPF, DKIM, DMARC), detecting reply-to mismatches, Unicode homoglyph substitutions, zero-width character injection, and display name inconsistencies. These fast checks provide immediate signals and contextual evidence for the subsequent LLM classification.</span></p>
<p><span style="font-weight: 400;">In <strong>Stage 2</strong>, an LLM-powered Router analyses the email content alongside pre-check results to identify candidate attack patterns from the threat ontology.</span></p>
<p><span style="font-weight: 400;"><strong>Stage 3</strong> performs a configuration-driven lookup: each candidate attack maps to a specific subset of agents via 265 trigger rules, each with an assigned priority (CRITICAL, HIGH, MEDIUM, LOW). <strong>Stage 4</strong> executes the selected agents in parallel — a mix of deterministic rules, <strong>LLM-based content analysis</strong>, and heuristic checks. Finally, <strong>Stage 5</strong>’s Orchestrator fuses all findings through weighted confidence scoring, applies multi-source corroboration boosting and single-source capping to prevent false positives, and produces a human-readable threat explanation.</span></p>
<p><span style="font-weight: 400;">To make this concrete, let’s walk through what happens when our CEO impersonation email hits the system. In the first stage, eight deterministic agents run. SA-01.3 (DMARC Evaluator) flags the authentication failure with 90% confidence. SA-02.8 (Reply-To Mismatch Detector) spots that the reply-to points to a personal Gmail account — a different domain entirely — at 95% confidence. SA-03.1 (Display Name Checker) notices a role claim (“CEO”) paired with a suspicious domain.</span></p>
<p><span style="font-weight: 400;">But here’s the part that matters: <strong>for invoice fraud emails where the attacker controls their own domain, all authentication checks pass cleanly.</strong> That’s where the LLM-powered agents take over. SA-07.1 (Urgency &amp; Pressure Analyser) picks up the “don’t discuss with anyone” and “needs to go out today” patterns. An LLM-based content classifier cross-references the email against our ontology of 23 wealth management-specific attack types — from client impersonation to capital call fraud to QR code phishing.</span></p>
<h2 class="" style="--fontsize: 42; line-height: 1.3;" data-fontsize="42" data-lineheight="54.6px"><b>Where we are and what’s next</b></h2>
<p><span style="font-weight: 400;">This work is ongoing. The framework’s architecture, threat ontology, and scoring engine are operational, with a working REST API and web dashboard that lets analysts inspect every agent’s finding in real time. Early tests show the system correctly quarantining BEC attempts while passing legitimate business emails through cleanly. Our discussions with KM3 have been instrumental in shaping the attack ontology — ensuring the 23 attack types reflect genuine threats that wealth management operations face, not just textbook classifications.</span></p>
<p><span style="font-weight: 400;"><strong>Next steps</strong> within CyberAId include <strong>implementing the full set of 66 agents</strong> (currently, eight deterministic pre-checks are production-ready while the remaining agents are progressively being developed), validating against real-world email datasets, and exploring federated deployment models that would allow multiple financial institutions to benefit from shared threat intelligence without exposing private communications. We’re also investigating how the <strong>framework can be extended</strong> beyond email to cover other communication channels used in financial operations.</span></p>
<p><br style="font-weight: 400;" /><br style="font-weight: 400;" /></p>
</div><div class="awb-gallery-wrapper awb-gallery-wrapper-4 button-span-no" style="--more-btn-alignment:center;"><div style="margin:-5px;--awb-bordersize:0px;" class="fusion-gallery fusion-gallery-container fusion-grid-1 fusion-columns-total-2 fusion-gallery-layout-grid fusion-gallery-4"><div style="padding:5px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-1 hover-type-none awb-imageframe-style awb-imageframe-style-below awb-imageframe-style-4"><div class="fusion-gallery-image"><a href="https://cyberaidproject.eu/wp-content/uploads/2026/03/IMG_8059.png" rel="noreferrer" data-rel="iLightbox[gallery_image_4]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://cyberaidproject.eu/wp-content/uploads/2026/03/IMG_8059.png" width="1750" height="1000" alt="" title="IMG_8059" aria-label="IMG_8059" class="img-responsive wp-image-4843" srcset="https://cyberaidproject.eu/wp-content/uploads/2026/03/IMG_8059-200x114.png 200w, https://cyberaidproject.eu/wp-content/uploads/2026/03/IMG_8059-400x229.png 400w, https://cyberaidproject.eu/wp-content/uploads/2026/03/IMG_8059-600x343.png 600w, https://cyberaidproject.eu/wp-content/uploads/2026/03/IMG_8059-800x457.png 800w, https://cyberaidproject.eu/wp-content/uploads/2026/03/IMG_8059-1200x686.png 1200w, https://cyberaidproject.eu/wp-content/uploads/2026/03/IMG_8059.png 1750w" sizes="(min-width: 2200px) 100vw, (min-width: 640px) 1220px, " /></a></div><div class="awb-imageframe-caption-container" style="text-align:center;"><div class="awb-imageframe-caption"><h2 class="awb-imageframe-caption-title">IMG_8059</h2><p class="awb-imageframe-caption-text">Figure 1. Walk-through of a BEC detection: five agents flag independent signals, the orchestrator fuses them into a QUARANTINE verdict with a full explanation.</p></div></div></div><div class="clearfix"></div><div style="padding:5px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-1 hover-type-none awb-imageframe-style awb-imageframe-style-below awb-imageframe-style-4"><div class="fusion-gallery-image"><a href="https://cyberaidproject.eu/wp-content/uploads/2026/03/IMG_8058-2.png" rel="noreferrer" data-rel="iLightbox[gallery_image_4]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://cyberaidproject.eu/wp-content/uploads/2026/03/IMG_8058-2.png" width="1800" height="1150" alt="" title="IMG_8058" aria-label="IMG_8058" class="img-responsive wp-image-4842" srcset="https://cyberaidproject.eu/wp-content/uploads/2026/03/IMG_8058-2-200x128.png 200w, https://cyberaidproject.eu/wp-content/uploads/2026/03/IMG_8058-2-400x256.png 400w, https://cyberaidproject.eu/wp-content/uploads/2026/03/IMG_8058-2-600x383.png 600w, https://cyberaidproject.eu/wp-content/uploads/2026/03/IMG_8058-2-800x511.png 800w, https://cyberaidproject.eu/wp-content/uploads/2026/03/IMG_8058-2-1200x767.png 1200w, https://cyberaidproject.eu/wp-content/uploads/2026/03/IMG_8058-2.png 1800w" sizes="(min-width: 2200px) 100vw, (min-width: 640px) 1220px, " /></a></div><div class="awb-imageframe-caption-container" style="text-align:center;"><div class="awb-imageframe-caption"><h2 class="awb-imageframe-caption-title">IMG_8058</h2><p class="awb-imageframe-caption-text">Figure 2. The five-stage EMTD pipeline, from email ingestion to threat verdict</p></div></div></div><div class="clearfix"></div></div></div></div></div></div></div>
<p>The post <a href="https://cyberaidproject.eu/blog/a-multi-agent-framework-for-email-threat-detection-pipeline-in-financial-services/">A Multi-Agent Framework for Email Threat Detection pipeline in Financial Services</a> appeared first on <a href="https://cyberaidproject.eu">CyberAid</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>New Collaboration Between CyberAId and 3D Circular on AI-Driven Training and Education</title>
		<link>https://cyberaidproject.eu/news/new-collaboration-between-cyberaid-and-3d-circular-on-ai-driven-training-and-education/</link>
		
		<dc:creator><![CDATA[elina]]></dc:creator>
		<pubDate>Tue, 03 Mar 2026 12:45:33 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Meeting]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://cyberaidproject.eu/?p=4813</guid>

					<description><![CDATA[<p>Get the latest insights, market trends &amp; inspiration!</p>
<p>The post <a href="https://cyberaidproject.eu/news/new-collaboration-between-cyberaid-and-3d-circular-on-ai-driven-training-and-education/">New Collaboration Between CyberAId and 3D Circular on AI-Driven Training and Education</a> appeared first on <a href="https://cyberaidproject.eu">CyberAid</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top-small:40px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1256.6px;margin-left: calc(-3% / 2 );margin-right: calc(-3% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-size:cover;--awb-width-large:100%;--awb-spacing-right-large:1.455%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.455%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.455%;--awb-spacing-left-medium:1.455%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.455%;--awb-spacing-left-small:1.455%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-9 fusion-text-no-margin" style="--awb-margin-bottom:40px;"><p>A new collaboration between the CyberAId and <a href="https://3d-circular.eu/">3D Circular</a> projects was established, following the presentation of CyberAId during the recent 3D Circular project meeting. The two projects will join forces to <strong>co-develop training curricula and educational content</strong> focused on <strong>advancing skills in AI, cybersecurity, and digitalisation within circular economy contexts.</strong></p>
<p>This partnership reflects our shared commitment to fostering capacity building, cross-domain knowledge transfer, and innovation-driven collaboration within the European research and innovation ecosystem.</p>
<p>Stay tuned for updates as we shape new learning resources and synergies that support Europe’s digital and sustainable transformation.</p>
</div></div></div></div></div>
<p>The post <a href="https://cyberaidproject.eu/news/new-collaboration-between-cyberaid-and-3d-circular-on-ai-driven-training-and-education/">New Collaboration Between CyberAId and 3D Circular on AI-Driven Training and Education</a> appeared first on <a href="https://cyberaidproject.eu">CyberAid</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CyberAId Kick-off Meeting</title>
		<link>https://cyberaidproject.eu/videos/general/cyberaid-kick-off-meeting/</link>
		
		<dc:creator><![CDATA[innov]]></dc:creator>
		<pubDate>Wed, 20 Nov 2024 16:55:59 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Meeting]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://cyberaidproject.eu/?p=653</guid>

					<description><![CDATA[<p>Get the latest insights, market trends &amp; inspiration!</p>
<p>The post <a href="https://cyberaidproject.eu/videos/general/cyberaid-kick-off-meeting/">CyberAId Kick-off Meeting</a> appeared first on <a href="https://cyberaidproject.eu">CyberAid</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-9 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top-small:40px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1256.6px;margin-left: calc(-3% / 2 );margin-right: calc(-3% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-size:cover;--awb-width-large:100%;--awb-spacing-right-large:1.455%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.455%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.455%;--awb-spacing-left-medium:1.455%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.455%;--awb-spacing-left-small:1.455%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-10 fusion-text-no-margin" style="--awb-margin-bottom:40px;"><p style="text-align: justify;">The CyberAId Project kick-off meeting, hosted at OTE Academy on January 15–16,<span style="letter-spacing: -0.17px; background-color: rgba(0, 0, 0, 0);">2026, marked the official launch of a forward-looking European initiative dedicated to </span><span style="letter-spacing: -0.17px; background-color: rgba(0, 0, 0, 0);">advancing the convergence of cybersecurity and trustworthy artificial intelligence.</span></p>
<p style="text-align: justify;">Coordinated by UBITECH, the CyberAId project brings together a strong and <span style="letter-spacing: -0.17px; background-color: rgba(0, 0, 0, 0);">multidisciplinary consortium of technology providers, financial institutions, and </span><span style="letter-spacing: -0.17px; background-color: rgba(0, 0, 0, 0);">domain experts, united by a shared objective: strengthening cyber resilience through </span><span style="letter-spacing: -0.17px; background-color: rgba(0, 0, 0, 0);">advanced AI-driven methodologies and innovative security approaches.</span></p>
<p style="text-align: justify;">Over the course of two productive days, consortium partners aligned on strategic <span style="letter-spacing: -0.17px; background-color: rgba(0, 0, 0, 0);">objectives, technical direction, governance structure, and implementation roadmap.</span></p>
<p style="text-align: justify;">The discussions fostered a common understanding of roles and responsibilities while <span style="letter-spacing: -0.17px; background-color: rgba(0, 0, 0, 0);">laying the groundwork for effective collaboration throughout the project’s lifecycle. </span><span style="letter-spacing: -0.17px; background-color: rgba(0, 0, 0, 0);">Particular emphasis was placed on the project’s relevance to the financial sector and </span><span style="letter-spacing: -0.17px; background-color: rgba(0, 0, 0, 0);">its broader contribution to Europe’s evolving digital security landscape.</span></p>
<p style="text-align: justify;">Positioned within the European innovation ecosystem, CyberAId aims to deliver <span style="letter-spacing: -0.17px; background-color: rgba(0, 0, 0, 0);">impactful solutions that enhance the security, intelligence, and resilience of digital </span><span style="letter-spacing: -0.17px; background-color: rgba(0, 0, 0, 0);">infrastructures across Europe. By integrating trustworthy AI into cybersecurity </span><span style="letter-spacing: -0.17px; background-color: rgba(0, 0, 0, 0);">operations, the project aspires to set new standards for proactive and adaptive cyber </span><span style="letter-spacing: -0.17px; background-color: rgba(0, 0, 0, 0);">defence.</span></p>
<p style="text-align: justify;">Stay tuned for further updates as CyberAId progresses and contributes to shaping a <span style="letter-spacing: -0.17px; background-color: rgba(0, 0, 0, 0);">more secure and intelligent European digital future.</span></p>
</div><div class="fusion-video fusion-youtube" style="--awb-max-width:600px;--awb-max-height:360px;--awb-align-self:center;--awb-width:100%;"><div class="video-shortcode"><div class="fluid-width-video-wrapper" style="padding-top:60%;" ><iframe title="YouTube video player 1" src="https://www.youtube.com/embed/dVDAjp_FCxM?wmode=transparent&autoplay=0" width="600" height="360" allowfullscreen allow="autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture;"></iframe></div></div></div></div></div></div></div>
<p>The post <a href="https://cyberaidproject.eu/videos/general/cyberaid-kick-off-meeting/">CyberAId Kick-off Meeting</a> appeared first on <a href="https://cyberaidproject.eu">CyberAid</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
