Back to Feed

Tag

AI Security

51 items tagged #ai-security

Articles

AI Has Taken Over Open Source

AI-generated packages surge exponentially on npm, reshaping open source production and consumption.

macOS Kernel Memory Corruption Exploit - Schneier on Security

Researchers used Anthropic's Mythos AI to discover and exploit macOS kernel memory corruption flaw on Apple M5.

Socket raises $60M Series C at a $1B valuation to secure software supply chains for AI-driven development

Socket raises $60M Series C at $1B valuation to defend software supply chains against AI-era attacks.

Verizon DBIR: AI Helped Hackers Exploit Vulnerabilities in 31% of Recent Breaches

Verizon DBIR 2026: AI exploited software vulnerabilities in 31% of breaches, compressing exploit timelines from months

Breach entry point, 2026 DBIR finds | About Verizon

Verizon's 2026 DBIR finds vulnerability exploitation now top breach entry point, surpassing stolen credentials.

Pwn2Own Berlin 2026 Closes With $1.3 Million in Zero-Day Payouts

Pwn2Own Berlin 2026 concludes with 47 zero-day exploits demonstrated and $1.3M in payouts.

Hackers earn $1,298,250 for 47 zero-days at Pwn2Own Berlin 2026

Pwn2Own Berlin 2026 awards $1.3M for 47 zero-day exploits across enterprise and AI products.

Hackers Earn $1.3 Million at Pwn2Own Berlin 2026

Pwn2Own Berlin 2026 awards $1.3M for 47 zero-day exploits across Windows, Linux, VMware, Nvidia, and AI products.

Critical ‘Claw Chain’ Vulnerabilities Put Thousands of OpenClaw AI Servers at Risk

Four critical vulnerabilities in OpenClaw AI servers enable data theft, backdoors, and admin-level compromise.

Windows 11 and Microsoft Edge hacked at Pwn2Own Berlin 2026

Pwn2Own Berlin 2026 day one: researchers exploit 24 zero-days in Windows 11, Edge, Linux, and AI tools for $523K.

We detected 7 dynamic runtime impersonating malicious Chrome extensions. A remote kill-switch tar...

7 malicious Chrome extensions impersonating crypto wallets detected with Unicode spoofing and remote kill-switch.

When configuration becomes a vulnerability: Exploitable misconfigurations in AI apps

Microsoft warns of exploitable misconfigurations in cloud-native AI apps on Kubernetes enabling RCE and data leaks.

PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure

PraisonAI CVE-2026-44338 auth bypass exploited within hours of disclosure

Hackers Targeted PraisonAI Vulnerability Hours After Disclosure

Hackers probed PraisonAI authentication bypass CVE-2026-44338 within 3.75 hours of disclosure.

New critical Exim mailer flaw allows remote code execution

Critical Exim mail server flaw CVE-2026-45185 allows unauthenticated remote code execution via TLS handling.

This is what a realistic AI-era attack chain looks like. Drawn from 11,000+ anonymized cloud envi...

Report reveals realistic AI-era attack chains exploit misconfiguration and hardcoded credentials, not novel techniques.

Microsoft, Palo Alto Networks Find Many Vulnerabilities by Using AI on Their Own Code

Microsoft MDASH and Palo Alto's Claude Mythos AI find dozens of vulnerabilities in their own code.

‼️🇫🇷 Mistral AI allegedly breached: ~5GB of internal source code and ~450 private repositories...

Mistral AI allegedly breached; ~5GB source code and 450 private repos exposed by TeamPCP.

Microsoft's MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday

Microsoft's MDASH AI system discovered 16 Windows flaws, including 2 critical RCE vulnerabilities, fixed in May 2026

73 Seconds to Breach, 24 Hours to Patch: The Case for Autonomous Validation

Anthropic's Mythos AI model discovered 181 Firefox exploits in 14 days; CVE-to-exploit window now ~10 hours.

Android Adds Intrusion Logging for Sophisticated Spyware Forensics

Google launches Intrusion Logging in Android 16 for forensic analysis of sophisticated spyware attacks.

Accelerating detection engineering using AI-assisted synthetic attack logs generation

Microsoft explores AI-assisted synthetic attack log generation to accelerate detection engineering.

Defense at AI speed: Microsoft’s new multi-model agentic security system finds 16 new vulnerabilities

Microsoft announces MDASH AI system that discovered 16 new Windows vulnerabilities including 4 critical RCE flaws.

Patch Tuesday, May 2026 Edition

May 2026 Patch Tuesday: Microsoft, Apple, Google, Mozilla, Oracle release record patch volumes driven by AI

Microsoft addresses 137 vulnerabilities in May’s Patch Tuesday, including 13 rated critical

Microsoft patches 137 vulnerabilities in May Patch Tuesday, including 13 critical flaws.

Pwn2Own Berlin 2026 Hits Capacity as Rejected Hackers Release 0-Days

Rejected Pwn2Own Berlin 2026 researchers publicly disclose zero-days for Firefox, NVIDIA, and AI platforms.

Hugging Face Packages Weaponized With a Single File Tweak

Hugging Face tokenizer files can be manipulated to hijack AI model outputs and exfiltrate data.

OpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch Validation

OpenAI launches Daybreak, an AI-powered platform for vulnerability detection and patch validation.

‼️AIRDC advertised as AI-powered hidden remote desktop control tool for Windows targets A threat...

AIRDC, an AI-powered hidden remote desktop control tool, advertised for sale by threat actors targeting Windows.

Google Says Hackers Used AI to Develop a Zero-Day Exploit

Google discovers hackers using AI to develop zero-day exploits, Android backdoors, and supply chain attacks.

Google's Threat Intelligence Group has documented what it describes as the first confirmed instan...

Google TIG documents first confirmed AI-engineered zero-day exploit by threat actors

Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation

Google discloses first known zero-day 2FA bypass likely developed using AI by unknown threat actors.

Google Detects First AI-Generated Zero-Day Exploit

Google identifies first AI-generated zero-day exploit designed to bypass 2FA on web administration tool.

Google: Hackers used AI to develop zero-day exploit for web admin tool

Google reports hackers used AI to develop zero-day exploit for web admin tool.

Google spotted an AI-developed zero-day before attackers could use it

Google detects AI-developed zero-day exploit before cybercrime group mass-exploitation campaign.

Hackers Exploit Vercel GenAI to Mass-Produce Convincing Phishing Sites

Hackers abuse Vercel GenAI to mass-produce convincing phishing sites mimicking Microsoft, Adidas, Nike.

Hackers abuse Google ads, Claude.ai chats to push Mac malware

Attackers abuse Google Ads and Claude.ai shared chats to distribute macOS malware via social engineering.

Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak

Critical out-of-bounds read in Ollama allows remote memory leak affecting 300K+ servers.

ClaudeBleed Vulnerability Lets Hackers Hijack Claude Chrome Extension to Steal Data

ClaudeBleed vulnerability in Claude Chrome extension allows data exfiltration via guardrail bypass.

Flaw in Claude’s Chrome extension allowed ‘any’ other plugin to hijack victims’ AI

Chrome extension flaw in Anthropic's Claude allows malicious plugins to hijack AI agent without permissions.

AI Firm Braintrust Prompts API Key Rotation After Data Breach

Braintrust AI platform suffers AWS account breach exposing customer API keys.

One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk

Analysis of 25M security alerts reveals 1% of confirmed incidents came from low-severity alerts, with one missed threat

Vulnerability in Claude Extension for Chrome Exposes AI Agent to Takeover

ClaudeBleed vulnerability in Claude Chrome extension allows attackers to hijack AI agent via prompt injection.

Hackers Use Fake Claude AI Site to Infect Users With New Beagle Malware

Hackers use fake Claude AI site to distribute new Beagle backdoor malware via malvertising.

When prompts become shells: RCE vulnerabilities in AI agent frameworks

Microsoft discloses RCE vulnerabilities in Semantic Kernel AI agent framework via prompt injection.

Claude Code OAuth Tokens Can Be Stolen Through Stealthy MCP Hijacking

Mitiga researchers disclose OAuth token theft vulnerability in Claude Code via MCP hijacking.

Threat actors leverage LLMs to accelerate development of malicious browser extensions. These exte...

Threat actors use LLMs to develop malicious browser extensions disguised as AI tools.

AI Coding Agents Could Fuel Next Supply Chain Crisis

AI coding agents (Claude Code, Gemini CLI, Copilot CLI) vulnerable to malicious repo injection enabling supply chain

Thousands of Vibe-Coded Apps Expose Corporate and Personal Data on the Open Web

Thousands of AI-coded web apps expose sensitive corporate and personal data via misconfigured deployments.

Gemini CLI Vulnerability Could Have Led to Code Execution, Supply Chain Attack

Gemini CLI vulnerability allowed prompt injection to enable supply chain attacks via GitHub issues.

Tips & tricks