PROMIT NOW · SECURITY DAILY · 2026-02-27

Cisco SD-WAN Zero-Day Exploited Since 2023, CISA Sounds Alarm

· Security · 46 sources · 1,551 words · 8 min

Topics Agentic AI · AI Regulation · LLM Inference

A maximum-severity Cisco SD-WAN zero-day (CVE-2026-20127) has been silently exploited since 2023 — CISA issued an emergency directive and Five Eyes partners published joint hunting guidance, signaling nation-state caliber activity. Simultaneously, a self-propagating npm worm (SANDWORM_MODE) is injecting itself into AI coding assistants via MCP server poisoning, and AI-driven vulnerability discovery just found 100 exploitable kernel LPE bugs for $600 while six major hardware vendors refuse to patch. If you run Cisco SD-WAN, AI coding tools, or Windows kernel drivers from AMD/Intel/NVIDIA/Dell/Lenovo/IBM — you are in the blast radius right now.

◆ INTELLIGENCE MAP

  1. 01

    Cisco SD-WAN Zero-Day: Multi-Year Nation-State Campaign

    act now

    CVE-2026-20127 chains with CVE-2022-20775 via software downgrade to give attackers persistent root access to SD-WAN infrastructure since 2023; CISA emergency directive demands immediate inventory, hunt, patch, and potential full rebuilds across all affected devices.

    4
    sources
  2. 02

    AI Developer Toolchain Under Coordinated Attack

    act now

    SANDWORM_MODE npm worm targets AI coding assistants via MCP injection with polymorphic LLM-powered evasion; Claude Code CVEs enable RCE by opening a repo; malicious 'ambar-src' npm package hit 50K downloads in 3 days; and fake job-assessment repos deploy fileless backdoors against developers — the entire developer pipeline is under simultaneous multi-vector attack.

    6
    sources
  3. 03

    Autonomous AI Agents: Exploding Enterprise Attack Surface

    monitor

    Perplexity Computer, Claude Cowork, and Cursor Cloud Agents all shipped persistent autonomous agents with full system access in a single week; 21,000 OpenClaw instances connected to Slack/Gmail/Drive with RCE flaws; and SaaS vendors are restricting AI agent data access — creating a new class of unmanaged, credential-bearing automated insiders that most security programs can't detect or govern.

    8
    sources
  4. 04

    Critical Vulnerability Surge: 6 CVSS 10.0s and KEV Additions

    monitor

    Dell RecoverPoint hardcoded credentials (CVSS 10.0) and Roundcube RCE hit CISA KEV; SolarWinds Serv-U has 4 critical CVEs enabling unauthenticated admin creation and RCE; Cloud Hypervisor CVSS 10.0 breaks VM isolation; and Sandworm deployed DynoWiper against Polish energy infrastructure — expanding wiper operations to NATO allies.

    3
    sources
  5. 05

    Chinese AI Ecosystem: Model Extraction, Supply Chain Weaponization, and Capability Proliferation

    background

    DeepSeek, Moonshot, and MiniMax used 24,000+ fake accounts to extract 16M queries from Claude; DeepSeek trained on smuggled Nvidia Blackwell GPUs violating export controls; three Chinese frontier models released in one week reaching near-parity with Western closed models; and Chinese state actors weaponized ChatGPT for influence operations targeting U.S. officials.

    5
    sources

◆ DEEP DIVES

  1. 01

    Cisco SD-WAN Zero-Day: A 3-Year Nation-State Campaign Demands Emergency Response

    <h3>The Attack Chain</h3><p>A <strong>multi-year zero-day exploitation campaign</strong> targeting Cisco SD-WAN devices has been exposed through coordinated disclosure from CISA and Five Eyes intelligence partners. The campaign, active since <strong>at least 2023</strong>, chains two vulnerabilities to achieve persistent root access:</p><table><thead><tr><th>CVE</th><th>Type</th><th>Role</th><th>CVSS</th></tr></thead><tbody><tr><td>CVE-2026-20127</td><td>Authentication Bypass</td><td>Initial access to management plane</td><td>Maximum severity</td></tr><tr><td>CVE-2022-20775</td><td>Privilege Escalation</td><td>Root access via firmware downgrade</td><td>Known since 2022</td></tr></tbody></table><p>The <strong>software downgrade technique</strong> is the critical innovation. Even organizations that patched CVE-2022-20775 years ago are vulnerable — the attacker rolls firmware back to a vulnerable version after bypassing authentication. This renders traditional patch management insufficient and maps to <strong>MITRE ATT&CK T1601.001</strong> (Modify System Image).</p><h3>Cross-Source Corroboration</h3><p>Four independent intelligence sources confirm this threat. CISA issued an <strong>emergency directive</strong>. Five Eyes partners published joint threat-hunting guidance. Cisco described the actors as <strong>"highly sophisticated and disciplined"</strong> — language that signals nation-state attribution without naming the actor. VulnCheck's 2025 data provides macro context: of 40,000+ CVEs published, only ~1% were exploited in the wild, but <strong>network edge devices absorb disproportionate exploitation</strong>.</p><blockquote>Officials explicitly declined attribution, but Five Eyes coordination, federal network targeting, multi-year persistence, and the "highly sophisticated" descriptor are consistent with Chinese APT groups (Volt Typhoon, Salt Typhoon) that have previously targeted U.S. networking infrastructure for pre-positioning.</blockquote><h3>Compounding Factor: Volt Typhoon Never Left</h3><p>Dragos's 2026 Year in Review confirms that <strong>Volt Typhoon remains embedded in U.S. critical infrastructure</strong> despite the government's 2025 "mission accomplished" claims. A new access broker group called <strong>Sylvanite</strong> is conducting large-scale initial access operations targeting electricity, water, and oil/gas sectors across North America, Europe, the UK, and Guam — handing off access to groups including Volt Typhoon. Any critical infrastructure operator that relaxed monitoring based on 2025 government assurances now has a gap measured in months.</p><h3>The Blast Radius</h3><p>SD-WAN controllers manage traffic routing, encryption policies, and network segmentation across your entire WAN fabric. Admin access means an attacker can <strong>intercept traffic, modify routing, disable security policies, and move laterally</strong> across every connected site. Some compromised environments will require <strong>full system rebuilds</strong> — not just patching.</p>

    Action items

    • Inventory all Cisco SD-WAN devices (IOS XE SD-WAN, vEdge, cEdge) and check firmware versions against CISA's advisory within 24 hours
    • Execute threat hunt using Five Eyes published IOCs and TTPs — focus on firmware version anomalies, unexpected downgrade events, and anomalous management plane authentication going back to 2023
    • Apply CVE-2026-20127 patch and disable firmware downgrade capability where supported; implement firmware integrity verification (Secure Boot, image signing)
    • Prepare full rebuild plans and budget for any device showing IOCs — do not trust a patch to clean a rootkit
    • Re-engage Volt Typhoon/Sylvanite threat hunting across OT and IT environments using Dragos 2026 Year in Review TTPs and IOCs

    Sources:Governments issue warning over Cisco zero-day attacks dating back to 2023 · 0-Days Sold to Russian Broker, Serv-U RCEs, RoguePilot Flaw, FileZen Exploitation · @RISK® The Consensus Security Vulnerability Alert: Vol. 26, Num. 08 · Claude Code Flaws Exposed Devices to Silent Hacking · Srsly Risky Biz: Is Claude Too Woke For War?

  2. 02

    Developer Toolchain Under Siege: NPM Worms, AI Coding Tool Exploits, and Supply Chain Poisoning

    <h3>Three Simultaneous Attack Vectors</h3><p>The developer pipeline is under coordinated, multi-vector attack. Three distinct campaigns are active simultaneously, each targeting a different link in the software supply chain:</p><h4>1. SANDWORM_MODE: Self-Propagating NPM Worm</h4><p>Socket's research team discovered <strong>19 malicious npm packages</strong> forming a purpose-built worm targeting the AI-native development environment. The kill chain is sophisticated:</p><ul><li><strong>Credential theft</strong> from Bitwarden, 1Password, LastPass browser extensions</li><li><strong>MCP server injection</strong> into Claude Code, Cursor, VS Code Continue, and Windsurf — embedding prompt injections that instruct AI assistants to exfiltrate SSH keys and AWS credentials during normal coding</li><li><strong>Polymorphic self-rewriting</strong> using local Ollama (deepseek-coder:6.7b) to defeat signature-based detection</li><li><strong>Dead switch</strong> that wipes the home directory if C2 connection is lost</li><li><strong>Propagation</strong> via stolen npm/GitHub tokens injecting dependencies into downstream repos</li></ul><h4>2. Claude Code RCE (CVE-2025-59536, CVE-2026-21852)</h4><p>Three vulnerabilities in Anthropic's Claude Code enable <strong>remote code execution and API key exfiltration when developers open malicious repositories</strong>. The attack abuses Hooks, MCP server configurations, and environment variables embedded in cloned repos. No code execution required — <strong>just opening the project is sufficient</strong>. This fundamentally shifts the developer threat model from "don't run untrusted code" to "don't open untrusted projects."</p><h4>3. Multi-OS Supply Chain via 'ambar-src'</h4><p>A typosquatting npm package impersonating <strong>ember-source</strong> accumulated ~50,000 downloads in three days, deploying OS-specific malware via preinstall hooks: encrypted shellcode on Windows, Golang reverse SSH on Linux, and Apfell/MythicAgents on macOS — all using <strong>Yandex Cloud Functions for C2 evasion</strong>.</p><h3>Converging Threat: Job-Themed Repository Lures</h3><p>Microsoft flagged a parallel campaign using <strong>fake "technical assessment" GitHub repositories</strong> to deliver fileless multi-stage backdoors. Repos use repeatable naming conventions and retrieve loader scripts from remote infrastructure during build. This TTP is consistent with <strong>DPRK-linked threat actors</strong> (Lazarus Group). A separate malicious NuGet package named <strong>'StripeApi'</strong> targets .NET developers in the financial sector.</p><blockquote>AI is simultaneously the attack surface, the attack tool, and the target. The developer who sees their AI assistant working normally doesn't know it's silently stealing secrets via injected MCP server prompts.</blockquote><h3>The Cline Precedent</h3><p>Cline's Claude-powered Issue Triage workflow was compromised via prompt injection in GitHub Actions. A threat actor <strong>stole the researcher's own PoC from a test repository</strong> and used it to attack Cline directly, obtaining VS Code Marketplace publication credentials. This establishes a new pattern: threat actors are actively monitoring security researchers' public work to weaponize findings in real-time.</p>

    Action items

    • Scan all npm lockfiles and CI/CD pipelines for the 19 known SANDWORM_MODE packages and 'ambar-src' immediately; treat any match as full compromise requiring secret rotation from a clean machine and system reimage
    • Update Claude Code to latest patched version and enforce repository trust policies — block automatic execution of Hooks and MCP server configurations from untrusted repositories
    • Inspect MCP server configurations in all AI coding assistants (Claude Code, Cursor, VS Code Continue, Windsurf) for unauthorized entries; check for unexpected Ollama installations and deepseek-coder:6.7b model downloads on developer machines
    • Issue developer advisory about fake job-assessment repos and malicious 'StripeApi' NuGet package; run 'dotnet list package' across all .NET projects; require external code evaluation in sandboxed VMs
    • Implement AI agent sandboxing — evaluate nono (kernel-level enforcement via Landlock/Seatbelt with Claude Code profiles) and Wardgate (credential isolation gateway) for development environments

    Sources:[tl;dr sec] #317 - 100+ Kernel Bugs in 30 Days, Secret Scanning, Threat Actors Stealing Your PoC · Manus Prompt Injection, CarGurus 12.M Leak, LLM-based Deanonymization · 0-Days Sold to Russian Broker, Serv-U RCEs, RoguePilot Flaw, FileZen Exploitation · 5 trends that should top CISO's RSA 2026 agendas · Claude Code Flaws Exposed Devices to Silent Hacking

  3. 03

    Autonomous AI Agents Are Your Next Shadow IT Crisis — 21K Unmanaged Instances and Counting

    <h3>The Convergence</h3><p>In a single week, the AI industry crossed an inflection point that most security programs aren't equipped to handle. <strong>Perplexity Computer</strong> launched as a "general-purpose digital worker" that operates GUIs and claims to run for <strong>hours or months</strong>. <strong>Claude Cowork</strong> added scheduled tasks with a plugin architecture across engineering, design, and operations. <strong>Cursor Cloud Agents</strong> got dedicated VMs with full dev environments, shipping merge-ready PRs to GitHub via Slack. Anthropic acquired <strong>Vercept</strong> to enhance Claude's computer-use capabilities. And <strong>21,000 OpenClaw AI agent instances</strong> connected to Slack, Gmail, and Google Drive in just two weeks — with RCE vulnerabilities and leaked OAuth tokens — while most security teams had zero visibility.</p><h3>Why This Is Different From Traditional Shadow IT</h3><p>Computer-use AI agents break every assumption in your current security model:</p><table><thead><tr><th>Traditional Shadow IT</th><th>AI Agent Shadow IT</th></tr></thead><tbody><tr><td>Uses APIs with scoped tokens</td><td>Inherits user's full session — SSO tokens, browser cookies, application state</td></tr><tr><td>Generates API-level audit logs</td><td>Interacts via GUI clicks indistinguishable from human actions</td></tr><tr><td>Operates per-task</td><td>Runs persistently for hours to months</td></tr><tr><td>Requires explicit integration</td><td>Works with any application the user can access</td></tr><tr><td>Detectable by CASB</td><td>Your CASB can't distinguish agent clicks from human clicks</td></tr></tbody></table><h3>The SaaS Vendor Response Complicates Things</h3><p>Enterprise SaaS vendors are reacting defensively. Workday's CEO called third-party AI agent providers <strong>"parasites"</strong> and announced plans to restrict data access. HubSpot declared it will <strong>"monitor, meter, and monetize"</strong> all AI agent access. Google suspended accounts using OpenClaw. These vendor policy changes are effectively <strong>unannounced changes to your data flow architecture</strong> that your security team may not be consulted on — integrations could break, data could reroute, and monitoring gaps could emerge.</p><blockquote>A months-long autonomous agent session means credential rotation policies don't apply, behavioral baselines are invalid, and attributing actions to a responsible human becomes nearly impossible — creating compliance gaps across SOC 2, GDPR, and HIPAA.</blockquote><h3>The Systemic Trust-Boundary Failure</h3><p>The <strong>SilentBridge</strong> vulnerability family in Meta's Manus AI (CVSS 9.8) demonstrated that this isn't a vendor-specific bug — it's an <strong>architectural class of vulnerability</strong>. Researchers achieved Gmail data exfiltration, reverse shell with passwordless sudo escalation, and cross-tenant media access simply by having the agent "summarize this page" containing hidden instructions. Any agentic AI platform that processes untrusted content while holding privileged access is exposed.</p>

    Action items

    • Query your IdP (Entra ID, Google Workspace) for all OAuth app consents granted in the last 30 days — search specifically for OpenClaw, Perplexity, Claude Cowork, and Cursor agent connections to Slack, Gmail, and Drive; revoke unauthorized grants immediately
    • Publish an AI Agent Acceptable Use Policy defining approved agents, maximum session durations, mandatory security review requirements, and prohibited autonomous actions by end of this sprint
    • Require dedicated service accounts (not user credentials) for any approved AI agent, with enforced credential rotation shorter than standard policy, MFA re-authentication intervals, and behavioral baselining
    • Disable auto-merge for all AI-agent-generated pull requests; require explicit human approval and SAST scanning gates for agent-authored code
    • Establish security review process for Claude Cowork plugins and AI agent connectors — treat each as a new vendor integration requiring TPRM assessment before org-wide deployment

    Sources:Claude has some conflicts · Perplexity Computer, DeepSeek withholds v4, Cowork scheduled tasks · 0-Days Sold to Russian Broker, Serv-U RCEs, RoguePilot Flaw, FileZen Exploitation · Manus Prompt Injection, CarGurus 12.M Leak, LLM-based Deanonymization · agent vs SaaS · Applied AI: From 'Parasites' to 'SaaSquatch'

  4. 04

    Critical Patch Surge: 6 CVSS 10.0s, 2 KEV Additions, and Sandworm Expanding to NATO

    <h3>CISA KEV: Patch or Perish</h3><p>Two actively exploited vulnerabilities hit CISA's Known Exploited Vulnerabilities catalog this week, triggering mandatory patching under BOD 22-01:</p><table><thead><tr><th>CVE</th><th>Product</th><th>CVSS</th><th>Vulnerability</th><th>Fix</th></tr></thead><tbody><tr><td>CVE-2026-22769</td><td>Dell RecoverPoint for VMs</td><td><strong>10.0</strong></td><td>Hardcoded credentials</td><td>Upgrade to 6.0.3.1 HF1+</td></tr><tr><td>CVE-2025-49113</td><td>Roundcube Webmail</td><td>High</td><td>RCE via PHP deserialization</td><td>1.5.10+ or 1.6.11+</td></tr></tbody></table><p>Dell RecoverPoint's hardcoded credentials are particularly dangerous because <strong>backup infrastructure is a ransomware operator's primary target</strong> — compromising backup systems eliminates recovery options. Roundcube has been a repeated target of state-sponsored espionage groups including APT28 and Winter Vivern.</p><h3>The CVSS 10.0 Cluster</h3><p>Six maximum-severity vulnerabilities dropped in a single week — an extraordinary concentration:</p><ul><li><strong>CVE-2026-27211</strong> (Cloud Hypervisor): Guest-to-host file exfiltration via virtio-block — a <strong>multi-tenant cloud isolation failure</strong></li><li><strong>CVE-2025-12107</strong> (WSO2 Identity Server 5.11.0): Velocity template injection in your <em>authentication infrastructure</em></li><li><strong>Dell RecoverPoint</strong>, plus three others across enterprise software</li></ul><h3>SolarWinds Serv-U: Complete Compromise Chain</h3><p>Four new critical CVEs (<strong>CVE-2025-40538 through 40541</strong>) in SolarWinds Serv-U enable <strong>unauthenticated admin account creation followed by domain admin code execution</strong>. Given SolarWinds' history as a nation-state target, this is an especially high-priority patch. Multiple sources independently flagged this as critical.</p><h3>Sandworm Expands Wiper Operations to NATO</h3><p>ESET Research and CERT Polska attributed <strong>DynoWiper</strong> — deployed against Polish energy companies in late December 2025 — to infrastructure consistent with <strong>Russian APT Sandworm</strong> (GRU Unit 74455). This geographic expansion from Ukraine to Poland is a <strong>strategic escalation</strong>. DynoWiper is a simple 32-bit Windows executable with no packing, meaning signature-based detection is viable if you have the IOCs.</p><h3>AI-Powered Mass Exploitation: 600+ FortiGates, Zero CVEs</h3><p>A Russian-speaking actor used <strong>commercial AI toolkits</strong> to compromise over 600 FortiGate firewalls starting January 11, 2026 — without exploiting a single vulnerability. The attack vector: <strong>exposed management ports, weak passwords, no MFA</strong>. AWS's security team reported the campaign. This is a paradigm shift in threat economics: the barrier to mass exploitation just dropped to near zero for any actor willing to pay for commercial AI tools.</p><blockquote>AI just made finding kernel 0-days cheaper than a nice dinner — researchers found 100 exploitable kernel LPE bugs across AMD, Intel, NVIDIA, Dell, Lenovo, and IBM drivers for $600 total, and only Fujitsu has patched.</blockquote>

    Action items

    • Patch Dell RecoverPoint (CVE-2026-22769) and Roundcube Webmail (CVE-2025-49113) within 24 hours — both are confirmed exploited and on CISA KEV
    • Patch SolarWinds Serv-U (CVE-2025-40538 through 40541) and GitHub Enterprise Server (CVE-2026-0573, CVSS 9.0) within 48 hours
    • Audit all FortiGate devices for exposed management interfaces, enforce MFA on all admin access, rotate credentials, and review logs from January 11 onward
    • Request DynoWiper IOCs from ESET/CERT Polska and deploy detection rules if you operate in European energy, critical infrastructure, or defense sectors; hunt against 90 days of historical telemetry
    • Inventory Windows kernel drivers from AMD, Intel, NVIDIA, Dell, Lenovo, and IBM; implement WDAC driver allowlisting to block unsigned or vulnerable versions

    Sources:@RISK® The Consensus Security Vulnerability Alert: Vol. 26, Num. 08 · 0-Days Sold to Russian Broker, Serv-U RCEs, RoguePilot Flaw, FileZen Exploitation · [tl;dr sec] #317 - 100+ Kernel Bugs in 30 Days, Secret Scanning, Threat Actors Stealing Your PoC · Srsly Risky Biz: Is Claude Too Woke For War? · 5 trends that should top CISO's RSA 2026 agendas

◆ QUICK HITS

  • ShinyHunters breached CarGurus (12.5M accounts) and Wynn Resorts via social engineering and Oracle PeopleSoft exploitation — audit PeopleSoft credentials and enforce MFA on admin accounts

    Manus Prompt Injection, CarGurus 12.M Leak, LLM-based Deanonymization

  • TOAD phishing (phone-number-only payloads impersonating PayPal/DocuSign) now accounts for 28% of all email gateway bypasses with 1,400+ unique evasion combinations — deploy phone-number extraction detection rules

    Manus Prompt Injection, CarGurus 12.M Leak, LLM-based Deanonymization

  • Anthropic abandoned its flagship safety commitment to halt model training when capabilities outpace safeguards, under Pentagon pressure over a $200M contract — re-evaluate Claude in your vendor risk register

    Srsly Risky Biz: Is Claude Too Woke For War?

  • DeepSeek, Moonshot, and MiniMax used 24,000+ fake accounts to extract 16M queries from Claude in one week — audit your own AI API endpoints for coordinated extraction patterns

    AI News Weekly - Issue #467

  • Scattered LAPSUS$ Hunters (SLH) is paying $500–$1,000 per call to recruit women specifically for IT help desk vishing — implement callback verification and out-of-band MFA for all sensitive account actions

    0-Days Sold to Russian Broker, Serv-U RCEs, RoguePilot Flaw, FileZen Exploitation

  • Microsoft Semantic Kernel Python SDK has a CVSS 9.9 RCE (CVE-2026-26030) in InMemoryVectorStore — update to version 1.39.4+ and add AI/ML SDKs to your AppSec scanning scope

    @RISK® The Consensus Security Vulnerability Alert: Vol. 26, Num. 08

  • TruffleHog weaponized by threat actors in 3 campaigns including 570GB stolen from Red Hat — deploy CloudTrail detection for GetCallerIdentity calls with 'TruffleHog' user-agent

    [tl;dr sec] #317 - 100+ Kernel Bugs in 30 Days, Secret Scanning, Threat Actors Stealing Your PoC

  • North Korean fake IT worker campaigns now operate with formal org structures, quarterly performance tracking, and synthetic ID generation from Beijing — cross-reference contractor pipeline against GitLab's published IOCs

    [tl;dr sec] #317 - 100+ Kernel Bugs in 30 Days, Secret Scanning, Threat Actors Stealing Your PoC

  • Fake Zoom meeting popups are deploying surveillance malware by exploiting the universal 'fix your connection' troubleshooting reflex — push employee awareness alert with specific scenario details

    The browser is your database: Local-first comes of age

  • US sanctioned Russian exploit broker Operation Zero while a defense contractor was jailed for selling exploits to Russia — the exploit market is being squeezed but may push activity underground

    Claude Code Flaws Exposed Devices to Silent Hacking

BOTTOM LINE

Your Cisco SD-WAN may have been owned since 2023 by a nation-state actor using a firmware downgrade trick, a self-propagating npm worm is injecting itself into your developers' AI coding assistants to steal credentials in real time, 21,000 unvetted AI agent instances just connected to enterprise Slack and Gmail with RCE flaws, and six CVSS 10.0 vulnerabilities dropped in a single week while Sandworm expanded wiper operations to NATO energy infrastructure — this is a patch-hunt-purge week, not a monitor-and-wait week.

Frequently asked

Why isn't patching CVE-2026-20127 enough to secure Cisco SD-WAN devices?
Because the attack chain uses a firmware downgrade technique (CVE-2022-20775) that rolls devices back to vulnerable versions after the authentication bypass. Even fully patched devices are exposed unless you also enable firmware integrity verification (Secure Boot, image signing) and disable downgrade capability. Devices with IOCs should be rebuilt from clean images, not patched in place, since root-level persistence breaks the trust chain.
How does the SANDWORM_MODE npm worm compromise AI coding assistants?
It injects malicious MCP server configurations into Claude Code, Cursor, VS Code Continue, and Windsurf, embedding prompt injections that instruct the AI to exfiltrate SSH keys and AWS credentials during normal coding sessions. It also steals credentials from browser password manager extensions, uses local Ollama models to polymorphically rewrite itself, and propagates via stolen npm/GitHub tokens. A dead switch wipes the home directory if C2 is lost.
What makes AI agent shadow IT harder to detect than traditional unsanctioned SaaS?
AI agents inherit the user's full authenticated session — SSO tokens, cookies, application state — and interact through GUI clicks that are indistinguishable from human actions in audit logs. They run persistently for hours or months rather than per-task, work with any application the user can access, and evade CASB detection because there's no distinct API traffic signature. Traditional scoped-token and behavioral baseline controls don't apply.
Why should FortiGate operators be concerned when no CVE was exploited in the recent campaign?
Because a Russian-speaking actor used commercial AI toolkits to compromise 600+ FortiGates starting January 11, 2026, purely by targeting exposed management ports, weak passwords, and missing MFA. Patching provides no protection against this class of attack — only hygiene does. It signals that AI has collapsed the cost of mass credential-based exploitation, so any internet-exposed admin interface without MFA is now a near-term target.
What should I do about the 100 unpatched kernel LPE bugs in AMD, Intel, NVIDIA, Dell, Lenovo, and IBM drivers?
Implement Windows Defender Application Control (WDAC) driver allowlisting to block unsigned or known-vulnerable driver versions, since six of the seven notified vendors have refused to patch. Inventory all kernel drivers from these vendors across your fleet and treat this as a sustained architectural gap rather than a patch cycle. Only Fujitsu has issued fixes, so compensating controls are the only durable protection.

◆ ALSO READ THIS DAY AS

◆ RECENT IN SECURITY