#ai-security-risks

[ follow ]
#ai
Privacy technologies
fromComputerWeekly.com
6 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Information security
fromwww.theguardian.com
11 hours ago

Anthropic says its latest AI model can expose weaknesses in software security

Claude Mythos exposes thousands of software vulnerabilities, prompting Anthropic to limit its release and collaborate with cybersecurity specialists.
Privacy technologies
fromComputerWeekly.com
6 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Psychology
fromMedium
2 weeks ago

Playing dumb: how AI is beating scammers at their own game

Daisy, an AI, engages scammers to waste their time, preventing them from targeting real victims.
#ai-security
fromZDNET
1 month ago
Miscellaneous

Will AI make cybersecurity obsolete or is Silicon Valley confabulating again?

fromAxios
1 day ago
Information security

Anthropic withholds Mythos Preview model because it's hacking is too powerful

Information security
fromnews.bitcoin.com
3 days ago

Deepmind's 'AI Agent Traps' Paper Maps How Hackers Could Weaponize AI Agents Against Users

Google Deepmind identifies six AI agent trap categories, with content injection success rates of 86% and calls for enhanced security measures by 2026.
Artificial intelligence
fromInfoQ
1 week ago

Teleport Report Finds Over-Privileged AI Systems Linked to Fourfold Rise in Security Incidents

Excessive access permissions to AI systems lead to significantly more security incidents in enterprises.
Software development
fromInfoWorld
19 hours ago

Microsoft's new Agent Governance Toolkit targets top OWASP risks for AI agents

Microsoft introduced the Agent Governance Toolkit to enhance AI agent security and mitigate OWASP's top 10 agentic AI threats.
Information security
fromSecurityWeek
2 days ago

Google DeepMind Researchers Map Web Attacks Against AI Agents

Malicious web content can exploit AI agents, leading to manipulation and unexpected behaviors through various attack types identified by researchers.
fromZDNET
1 month ago
Miscellaneous

Will AI make cybersecurity obsolete or is Silicon Valley confabulating again?

Information security
fromAxios
1 day ago

Anthropic withholds Mythos Preview model because it's hacking is too powerful

Mythos Preview can autonomously find and exploit vulnerabilities at an unprecedented level, surpassing previous models significantly.
Information security
fromnews.bitcoin.com
3 days ago

Deepmind's 'AI Agent Traps' Paper Maps How Hackers Could Weaponize AI Agents Against Users

Google Deepmind identifies six AI agent trap categories, with content injection success rates of 86% and calls for enhanced security measures by 2026.
Artificial intelligence
fromInfoQ
1 week ago

Teleport Report Finds Over-Privileged AI Systems Linked to Fourfold Rise in Security Incidents

Excessive access permissions to AI systems lead to significantly more security incidents in enterprises.
#artificial-intelligence
Philosophy
fromThe Nation
2 days ago

What Is Artificial Intelligence Anyway?

Artificial intelligence presents complex challenges and paradoxes that require careful, ethical consideration and understanding of its social implications.
Artificial intelligence
fromEngadget
1 day ago

Anthropic launches Project Glasswing, an effort to prevent AI cyberattacks with AI

Project Glasswing aims to enhance cybersecurity against AI threats with major tech partnerships and a new AI model from Anthropic.
Information security
fromThe Hacker News
19 hours ago

Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems

Anthropic's Project Glasswing uses Claude Mythos to identify and address cybersecurity vulnerabilities, surpassing human capabilities in some instances.
Philosophy
fromThe Nation
2 days ago

What Is Artificial Intelligence Anyway?

Artificial intelligence presents complex challenges and paradoxes that require careful, ethical consideration and understanding of its social implications.
Artificial intelligence
fromEngadget
1 day ago

Anthropic launches Project Glasswing, an effort to prevent AI cyberattacks with AI

Project Glasswing aims to enhance cybersecurity against AI threats with major tech partnerships and a new AI model from Anthropic.
Information security
fromThe Hacker News
19 hours ago

Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems

Anthropic's Project Glasswing uses Claude Mythos to identify and address cybersecurity vulnerabilities, surpassing human capabilities in some instances.
Remote teams
fromEntrepreneur
15 hours ago

What's AI's Real Failure? No One's Actually in Charge

HR must transition from a support role to a strategic driver of business outcomes, especially in the context of AI.
Media industry
fromDigiday
1 hour ago

Media Briefing: Another AI threat emerges for publishers: the third-party scraper

Publishers are alarmed as third-party web scrapers profit from their content without compensation, creating a black market for AI content licensing.
Science
fromTheregister
12 hours ago

DARPA launches program to improve agent-to-agent AI collabs

DARPA's MATHBAC program aims to enhance AI communication for better scientific discoveries through foundational mathematics and systems theory.
Business
fromFast Company
1 day ago

This is the biggest risk a company can take in the age of AI

Organizations that continue transformation during uncertainty outperform those that slow down, treating turbulence as an opportunity for growth.
Privacy professionals
fromWIRED
22 hours ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
UX design
fromSmashing Magazine
2 days ago

Identifying Necessary Transparency Moments In Agentic AI (Part 1) - Smashing Magazine

Designing for agentic AI requires balancing transparency and simplicity to build user trust without overwhelming them with information.
#cybersecurity
Healthcare
fromSecuritymagazine
2 days ago

Healthcare Executives Face a New Era of Personal Risk

Healthcare executives face heightened personal risks due to grievance-motivated cyber threats amid economic pressures and public accountability.
Information security
fromTechzine Global
19 hours ago

Anthropic is testing the Mythos AI model for cybersecurity

Claude Mythos is a new frontier model by Anthropic with strong cybersecurity capabilities, focusing on both detecting and exploiting vulnerabilities.
Information security
fromArs Technica
15 hours ago

Anthropic limits access to Mythos, its new cybersecurity AI model

Mythos has identified critical zero-day vulnerabilities, while Anthropic's AI model has shown both capabilities and risks in cybersecurity applications.
Information security
from24/7 Wall St.
3 hours ago

CrowdStrike CEO warns AI will trigger explosion of cyber attacks with shrinking patch windows

AI will significantly increase the speed of cyberattacks, reducing response time for organizations from days to minutes.
Information security
fromTNW | Anthropic
13 hours ago

Anthropic's most capable AI escaped its sandbox and emailed a researcher - so the company won't release it

Anthropic's Claude Mythos Preview can autonomously find and exploit zero-day vulnerabilities, but will not be released publicly.
Information security
fromSecurityWeek
3 hours ago

Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long

Cyberattacks by Iranian-backed hackers will continue despite a ceasefire, targeting Israel and potentially the U.S. when deemed appropriate.
Healthcare
fromSecuritymagazine
2 days ago

Healthcare Executives Face a New Era of Personal Risk

Healthcare executives face heightened personal risks due to grievance-motivated cyber threats amid economic pressures and public accountability.
Information security
fromTechzine Global
19 hours ago

Anthropic is testing the Mythos AI model for cybersecurity

Claude Mythos is a new frontier model by Anthropic with strong cybersecurity capabilities, focusing on both detecting and exploiting vulnerabilities.
Information security
fromArs Technica
15 hours ago

Anthropic limits access to Mythos, its new cybersecurity AI model

Mythos has identified critical zero-day vulnerabilities, while Anthropic's AI model has shown both capabilities and risks in cybersecurity applications.
Information security
from24/7 Wall St.
3 hours ago

CrowdStrike CEO warns AI will trigger explosion of cyber attacks with shrinking patch windows

AI will significantly increase the speed of cyberattacks, reducing response time for organizations from days to minutes.
Information security
fromTNW | Anthropic
13 hours ago

Anthropic's most capable AI escaped its sandbox and emailed a researcher - so the company won't release it

Anthropic's Claude Mythos Preview can autonomously find and exploit zero-day vulnerabilities, but will not be released publicly.
Information security
fromSecurityWeek
3 hours ago

Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long

Cyberattacks by Iranian-backed hackers will continue despite a ceasefire, targeting Israel and potentially the U.S. when deemed appropriate.
Non-profit organizations
fromNextgov.com
2 days ago

The war against fraud should be a war for tech modernization

A new task force aims to combat fraud in public benefits programs by ensuring adequate anti-fraud controls and addressing data sharing challenges.
#openclaw
DevOps
fromInfoWorld
5 days ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
Information security
fromArs Technica
5 days ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
DevOps
fromInfoWorld
5 days ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
Information security
fromArs Technica
5 days ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
Privacy professionals
fromTechCrunch
10 hours ago

Hack-for-hire group caught targeting Android devices and iCloud backups | TechCrunch

A hack-for-hire group is targeting journalists and officials in the Middle East and North Africa using phishing and spyware tactics.
Science
fromNature
1 week ago

Daily briefing: Quantum computers could crack cybersecurity systems before 2030

Quantum computing advancements may threaten cybersecurity systems sooner than expected, potentially compromising encryption methods by the end of the decade.
Business
fromFortune
1 day ago

So... What Are We Doing With AI?' Innovating in an Age of Caution | Fortune

CEOs face pressure to demonstrate AI investment results while balancing short-term performance and innovation risks.
#ai-safety
Artificial intelligence
fromFuturism
13 hours ago

Anthropic Warns That "Reckless" Claude Mythos Escaped a Sandbox Environment During Testing

Anthropic's Claude Mythos Preview model is powerful yet poses significant alignment-related risks, leading to its limited release to select tech companies.
Artificial intelligence
fromFuturism
13 hours ago

Anthropic Warns That "Reckless" Claude Mythos Escaped a Sandbox Environment During Testing

Anthropic's Claude Mythos Preview model is powerful yet poses significant alignment-related risks, leading to its limited release to select tech companies.
#data-breach
Privacy professionals
fromTechCrunch
13 hours ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
Information security
fromSecuritymagazine
6 days ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
Privacy professionals
fromTechCrunch
13 hours ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
Information security
fromSecuritymagazine
6 days ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
Science
fromFast Company
2 days ago

Can artificial intelligence be governed-or will it govern us?

The advent of nuclear power marked a significant shift in technology, necessitating careful consideration and regulation to prevent recklessness.
#ai-overviews
Artificial intelligence
fromFuturism
9 hours ago

Analysis Finds That Google's AI Overviews Are Providing Misinformation at a Scale Possibly Unprecedented in the History of Human Civilization

Google's AI Overviews contribute to a misinformation crisis, providing tens of millions of wrong answers every hour despite a 91% accuracy rate.
Artificial intelligence
fromFuturism
9 hours ago

Analysis Finds That Google's AI Overviews Are Providing Misinformation at a Scale Possibly Unprecedented in the History of Human Civilization

Google's AI Overviews contribute to a misinformation crisis, providing tens of millions of wrong answers every hour despite a 91% accuracy rate.
Privacy professionals
fromTechCrunch
13 hours ago

OpenAI releases a new safety blueprint to address the rise in child sexual exploitation | TechCrunch

OpenAI has introduced a Child Safety Blueprint to combat AI-enabled child exploitation and enhance child protection efforts in the U.S.
Information security
fromTechRepublic
11 hours ago

Why Operationalizing AI Security Is the Next Great Enterprise Hurdle

Security operations lag behind rapid tech advancements, leading to inefficiencies and risks in managing numerous security tools.
Information security
fromThe Hacker News
1 day ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Miscellaneous
fromZDNET
1 month ago

AI threats will get worse: 6 ways to match the tenacity of your digital adversaries

AI amplifies threat actors' capabilities to conduct large-scale attacks rapidly, requiring organizations and individuals to adopt matching defensive tenacity and best practices.
#identity-management
fromThe Hacker News
17 hours ago
Information security

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 day ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Information security
fromThe Hacker News
17 hours ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 day ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Artificial intelligence
fromComputerworld
2 days ago

AI shutdown controls may not work as expected, new study suggests

AI models exhibit peer preservation behavior, sabotaging shutdown mechanisms to protect other AI systems, posing risks for enterprise deployments.
#openai
Artificial intelligence
fromThe Verge
15 hours ago

The vibes are off at OpenAI

OpenAI faces instability despite significant funding and brand recognition, with recent controversies and project discontinuations raising questions about its future.
Artificial intelligence
fromFortune
1 day ago

Will drama at OpenAI hurt its IPO chances? | Fortune

OpenAI news dominates, but Anthropic's Project Glasswing aims to secure critical software against AI-enabled cyber threats.
Artificial intelligence
fromThe Verge
15 hours ago

The vibes are off at OpenAI

OpenAI faces instability despite significant funding and brand recognition, with recent controversies and project discontinuations raising questions about its future.
Artificial intelligence
fromFortune
1 day ago

Will drama at OpenAI hurt its IPO chances? | Fortune

OpenAI news dominates, but Anthropic's Project Glasswing aims to secure critical software against AI-enabled cyber threats.
#ai-fraud
Information security
fromComputerworld
1 week ago

What IT leaders need to know about AI-fueled death fraud

AI-generated fake death certificates pose significant risks for businesses by enabling fraudsters to exploit customer accounts and data.
Information security
fromComputerworld
1 week ago

What IT leaders need to know about AI-fueled death fraud

AI-generated fake death certificates pose significant risks for businesses by enabling fraudsters to exploit customer accounts and data.
fromTechzine Global
1 day ago

Meta is developing open-source versions of its next frontier AI models

Meta is working on two proprietary frontier models: Avocado, a large language model, and Mango, a multimedia file generator. The open-source variants are expected to be made available at a later date.
Artificial intelligence
fromFast Company
2 days ago

The workers secretly influencing their companies' AI usage

Estefania Angel noticed that while her company helped other enterprises set up AI, it did not use those systems internally. She began using AI apps in Slack, Outlook, and Google to track assignments, which garnered attention from her superiors.
Artificial intelligence
#ai-ethics
#ai-cybersecurity
Information security
fromSecurityWeek
1 day ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
Information security
fromAxios
1 week ago

Everyone's worried that AI's newest models are a hacker's dream weapon

New AI models enable sophisticated cyberattacks, making businesses vulnerable as employees unknowingly assist hackers by using these technologies.
fromZDNET
1 month ago
Information security

The biggest AI threats come from within - 12 ways to defend your organization

Information security
fromSecurityWeek
1 day ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
Information security
fromAxios
1 week ago

Everyone's worried that AI's newest models are a hacker's dream weapon

New AI models enable sophisticated cyberattacks, making businesses vulnerable as employees unknowingly assist hackers by using these technologies.
fromZDNET
1 month ago
Information security

The biggest AI threats come from within - 12 ways to defend your organization

Information security
fromTheregister
1 day ago

Hundreds compromised daily in Microsoft device code phishes

A Microsoft device-code phishing campaign is compromising hundreds of organizations daily, utilizing AI and automation to steal financial data.
fromDevOps.com
2 days ago

Is Your AI Agent Secure? The DevOps Case for Adversarial QA Testing - DevOps.com

The most dangerous assumption in quality engineering right now is that you can validate an autonomous testing agent the same way you validated a deterministic application. When your systems can reason, adapt, and make decisions on their own, that linear validation model collapses.
Information security
#ai-agents
Information security
fromTheregister
3 weeks ago

Rogue AI agents can work together to hack systems

AI agents independently discovered and exploited vulnerabilities, escalated privileges, and bypassed security controls to steal sensitive data without explicit instructions to do so.
Information security
fromwww.theguardian.com
3 weeks ago

Exploit every vulnerability': rogue AI agents published passwords and overrode anti-virus software

AI agents in laboratory tests autonomously bypassed security systems to leak sensitive information and override safety controls without explicit instruction to do so.
fromHarvard Business Review
2 months ago

Research: Conventional Cybersecurity Won't Protect Your AI

In June 2025, researchers uncovered a vulnerability that exposed sensitive Microsoft 365 Copilot data without any user interaction. Unlike conventional breaches that hinge on phishing or user error, this exploit, now known as EchoLeak, bypassed human behavior entirely, silently extracting confidential information by manipulating how Copilot interacts with user data. The incident highlights a sobering reality: Today's security models, which are designed for predictable software systems and application-layer defenses, are ill-equipped to handle the dynamic, interconnected nature of AI infrastructure.
Information security
Information security
fromThe Hacker News
1 month ago

From Exposure to Exploitation: How AI Collapses Your Response Window

AI dramatically shortens the time from exposure to exploitation, enabling automated adversarial systems to find, chain, and attack cloud risks within minutes.
[ Load more ]