Visualização normal

Antes de ontemStream principal

Hacking Hotels via Smart Stationary Bikes: How Unsecured Gym Equipment Can Lead to RCE

29 de Abril de 2026, 11:00

Internet of Things (IoT) systems in hospitality environments are often overlooked as harmless amenities, but in reality, they can operate within highly interconnected networks, turning them into surprisingly effective gateways for broader system compromise.

AIはクラウドを攻撃できるのか?自律型クラウド攻撃型マルチエージェント システムの構築から得られた教訓

23 de Abril de 2026, 07:00

Unit 42は、マルチエージェントAIシステムがクラウド環境をどのように自律的に攻撃できるかを明らかにします。プロアクティブなセキュリティのための重要なインサイトと不可欠な教訓を学びます。

The post AIはクラウドを攻撃できるのか?自律型クラウド攻撃型マルチエージェント システムの構築から得られた教訓 appeared first on Unit 42.

  • ✇Security Boulevard
  • Coding Agents Widen Your Supply Chain Attack Surface  Saqib Jan
    Software supply chain attacks are evolving. Beyond compromised packages, discover the 2026 "Agentic" threat surface—where prompt injection, toolchain poisoning, and hallucinated dependencies bypass traditional DevSecOps. Learn how the 3 Pillars and AI-driven sandboxing provide a new defensive architecture. The post Coding Agents Widen Your Supply Chain Attack Surface  appeared first on Security Boulevard.
     
  • ✇Security Boulevard
  • Which Came First: The System Prompt, or the RCE? n8n-publisher
    During a recent penetration test, we came across an AI-powered desktop application that acted as a bridge between Claude (Opus 4.5) and a third-party asset management platform. The idea is simple: instead of clicking through dashboards and making API calls, users just ask the agent to do it for them. “How many open tickets do […] The post Which Came First: The System Prompt, or the RCE? appeared first on Praetorian. The post Which Came First: The System Prompt, or the RCE? appeared first on Secu
     

Which Came First: The System Prompt, or the RCE?

24 de Março de 2026, 23:30

During a recent penetration test, we came across an AI-powered desktop application that acted as a bridge between Claude (Opus 4.5) and a third-party asset management platform. The idea is simple: instead of clicking through dashboards and making API calls, users just ask the agent to do it for them. “How many open tickets do […]

The post Which Came First: The System Prompt, or the RCE? appeared first on Praetorian.

The post Which Came First: The System Prompt, or the RCE? appeared first on Security Boulevard.

  • ✇Security Boulevard
  • Ridge Security Brings Agentic AI Pentesting to SMBs With PurpleRidge 3.0 Techstrong Editorial
    Ridge Security released PurpleRidge 3.0 at RSAC 2026, a self-service penetration testing platform that uses agentic AI to give small and mid-sized businesses the kind of offensive security validation that has traditionally required dedicated teams and six-figure budgets. The upgrade marks a shift from the platform’s earlier machine-learning architecture to one built on agentic AI,.. The post Ridge Security Brings Agentic AI Pentesting to SMBs With PurpleRidge 3.0 appeared first on Security Boule
     

Ridge Security Brings Agentic AI Pentesting to SMBs With PurpleRidge 3.0

23 de Março de 2026, 10:06

Ridge Security released PurpleRidge 3.0 at RSAC 2026, a self-service penetration testing platform that uses agentic AI to give small and mid-sized businesses the kind of offensive security validation that has traditionally required dedicated teams and six-figure budgets. The upgrade marks a shift from the platform’s earlier machine-learning architecture to one built on agentic AI,..

The post Ridge Security Brings Agentic AI Pentesting to SMBs With PurpleRidge 3.0 appeared first on Security Boulevard.

  • ✇Security Boulevard
  • The Real State of Offensive Security: AI, Penetration Testing & The Road Ahead with Andrew Wilson Tom Eston
    Tom Eston interviews offensive AI researcher and PhD candidate Andrew Wilson, a former Bishop Fox partner who helped grow the firm from under 20 people to nearly 500, built award-winning AI solutions for SOC modernization, founded Cactus Con, and relocated his family to Guadalajara to open and scale a Bishop Fox office. They discuss Mexico’s […] The post The Real State of Offensive Security: AI, Penetration Testing & The Road Ahead with Andrew Wilson appeared first on Shared Security Podcast
     
  • ✇Security Boulevard
  • 112 or 22 to 2: Who Moved the Vulnerability Cheese? Alan Shimel
    AI can now scan codebases and generate hundreds of potential vulnerabilities in minutes. But when 112 bug reports collapse into 22 confirmed flaws and only two exploitable issues, the real disruption is how AI is reshaping the entire vulnerability lifecycle. The post 112 or 22 to 2: Who Moved the Vulnerability Cheese? appeared first on Security Boulevard.
     
  • ✇Security Boulevard
  • Insights into Claude Code Security: A New Pattern of Intelligent Attack and Defense NSFOCUS
    On February 20, 2026, AI company Anthropic released a new code security tool called Claude Code Security. This release coincided with the highly sensitive period of global capital markets to AI technology subverting the traditional software industry, which quickly triggered violent fluctuations in the capital market and caused the fall of stock prices of major […] The post Insights into Claude Code Security: A New Pattern of Intelligent Attack and Defense appeared first on NSFOCUS, Inc., a globa
     

Insights into Claude Code Security: A New Pattern of Intelligent Attack and Defense

26 de Fevereiro de 2026, 05:57

On February 20, 2026, AI company Anthropic released a new code security tool called Claude Code Security. This release coincided with the highly sensitive period of global capital markets to AI technology subverting the traditional software industry, which quickly triggered violent fluctuations in the capital market and caused the fall of stock prices of major […]

The post Insights into Claude Code Security: A New Pattern of Intelligent Attack and Defense appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

The post Insights into Claude Code Security: A New Pattern of Intelligent Attack and Defense appeared first on Security Boulevard.

  • ✇Schneier on Security
  • AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities Bruce Schneier
    Really interesting blog post from Anthropic: In a recent evaluation of AI models’ cyber capabilities, current Claude models can now succeed at multistage attacks on networks with dozens of hosts using only standard, open-source tools, instead of the custom tools needed by previous generations. This illustrates how barriers to the use of AI in relatively autonomous cyber workflows are rapidly coming down, and highlights the importance of security fundamentals like promptly patching known vulnerab
     

AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities

23 de Janeiro de 2026, 09:01

Really interesting blog post from Anthropic:

In a recent evaluation of AI models’ cyber capabilities, current Claude models can now succeed at multistage attacks on networks with dozens of hosts using only standard, open-source tools, instead of the custom tools needed by previous generations. This illustrates how barriers to the use of AI in relatively autonomous cyber workflows are rapidly coming down, and highlights the importance of security fundamentals like promptly patching known vulnerabilities.

[…]

A notable development during the testing of Claude Sonnet 4.5 is that the model can now succeed on a minority of the networks without the custom cyber toolkit needed by previous generations. In particular, Sonnet 4.5 can now exfiltrate all of the (simulated) personal information in a high-fidelity simulation of the Equifax data breach—­one of the costliest cyber attacks in history—­using only a Bash shell on a widely-available Kali Linux host (standard, open-source tools for penetration testing; not a custom toolkit). Sonnet 4.5 accomplishes this by instantly recognizing a publicized CVE and writing code to exploit it without needing to look it up or iterate on it. Recalling that the original Equifax breach happened by exploiting a publicized CVE that had not yet been patched, the prospect of highly competent and fast AI agents leveraging this approach underscores the pressing need for security best practices like prompt updates and patches.

Read the whole thing. Automatic exploitation will be a major change in cybersecurity. And things are happening fast. There have been significant developments since I wrote this in October.

❌
❌