[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fFM1EZj6K13oAQXuk9REOICp2MqUMoNQ7Gb7MYXsUYTQ":3},{"article":4,"iocs":43},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":23,"category":24,"article_tags":27},"a4b6b036-836c-49b9-93d4-35775f03230d","The Boring Stuff is Dangerous Now","the-boring-stuff-is-dangerous-now-e00177","AI agents capable of discovering and exploiting obscure vulnerabilities are emerging alongside developers producing vast amounts of potentially flawed AI-generated code, forcing defenders to adapt accordingly.","The security landscape is shifting as AI agents capable of discovering and exploiting previously obscure vulnerabilities emerge, while simultaneously developers are generating vast amounts of potentially flawed AI-generated code. This dual threat—intelligent exploitation combined with increased vulnerability surface—requires defenders to fundamentally rethink their approach to code quality and vulnerability detection.","AI agents emerging that can discover and exploit obscure vulnerabilities in AI-generated code.",null,"https:\u002F\u002Fwww.darkreading.com\u002Fcyber-risk\u002Fai-code-and-agents-forces-defenders-adapt","https:\u002F\u002Feu-images.contentstack.com\u002Fv3\u002Fassets\u002Fblt6d90778a997de1cd\u002Fblted41bae888a74bd1\u002F6a0780b73c21f620148b9b52\u002Fcyberattack_fear_Yuri_Arcurs_Alamy.jpg?width=1280&auto=webp&quality=80&disable=upscale","2026-05-18T13:00:00+00:00","2026-05-15T22:00:08.817017+00:00",7,[18,21],{"name":19,"type":20},"AI agents","technology",{"name":22,"type":20},"AI-generated code","839da5c1-3c34-47e2-9499-f7201640e3ac",{"id":23,"icon":11,"name":25,"slug":26},"AI Security","ai-security",[28,33,38],{"category":29},{"id":30,"icon":11,"name":31,"slug":32},"02371804-cf6d-4449-98de-f1a2d4d9b266","Tools","tools",{"category":34},{"id":35,"icon":11,"name":36,"slug":37},"80544778-fabb-4dcd-aa35-17492e5dcf4f","Vulnerabilities","vulnerabilities",{"category":39},{"id":40,"icon":11,"name":41,"slug":42},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[]]