Cisco SD-WAN CVE-2026-20127 Leads Worst Patch Week of 2026
Topics Agentic AI · AI Regulation · Data Infrastructure
Cisco Catalyst SD-WAN has a CVSS 10.0 authentication bypass (CVE-2026-20127) that has been actively exploited since February 25 — giving attackers full WAN fabric control — and it leads the densest critical-vulnerability week of 2026: 80+ CVEs scored 9.0+, spanning your ICS systems (Copeland CVSS 10.0), developer toolchain (Rollup, OpenSSL, Kubernetes, n8n), browser fleet (40+ Mozilla CVEs at CVSS 10.0), and mobile devices (Android zero-click RCE). Simultaneously, vendor data confirms attacker breakout-to-exfiltration has collapsed to 6 minutes. If your patching cadence is monthly, you're already compromised.
◆ INTELLIGENCE MAP
01 Critical Vulnerability Avalanche: Cisco 10.0, ICS 10.0, and 80+ CVSS 9.0+ CVEs
act nowFour CISA KEV additions, CVSS 10.0 in both Cisco SD-WAN and ICS/SCADA systems (Copeland XWEB Pro), critical RCE in developer tools (Rollup, OpenSSL, n8n, Langflow), and 40+ Firefox CVEs create a simultaneous multi-layer exposure event requiring emergency triage across network, OT, browser, mobile, and supply chain surfaces.
02 Attacker Breakout Collapse: 6-Minute Exfil and AI-Accelerated Kill Chains
act nowCrowdStrike reports 30-minute average lateral movement (down 70% in 4 years), ReliaQuest records first data theft at 6 minutes, and Chatty Spider achieves exfil to Google Drive in 4 minutes — while CyberStrikeAI's open-source release on GitHub combines MCP-based AI orchestration with 100+ offensive tools, compressing attack decision loops to machine speed.
03 OT/ICS Weaponization: Pre-Positioned Access Becoming Operational Weapons
monitorDragos confirms state-affiliated groups are transitioning multi-year ICS footholds from reconnaissance to active weaponization while three CISA ICS advisories this week (Copeland CVSS 10.0, Johnson Controls CVSS 9.8 with hardcoded credentials, InSAT MasterSCADA CVSS 9.8) demonstrate that OT vendors continue shipping products with fundamental authentication failures.
04 Non-Human Identity Crisis: AI Agents as Unmanaged Enterprise Principals
monitorGoogle Workspace CLI launched with 100+ agent skills and 8,800+ GitHub stars on day one, Cloudflare reports 94% of login attempts are bots, MCP adoption is creating 'identity dark matter' — ungoverned non-human entities with production data access — and Snyk claims organizations tracking only AI models miss 67% of their actual AI attack surface.
05 Law Enforcement Wins and Displacement Effects
backgroundTycoon 2FA (62% of Microsoft-blocked phishing, 500K+ orgs targeted, $350/month), LeakBase (142K members, 14-country takedown), The Com/Project Compass (30 arrests, Lapsus$/Scattered Spider pipeline), and Intellexa (8+ year prison sentences) represent a coordinated law enforcement offensive — but AitM techniques are commoditized and credential displacement to alternative channels is inevitable within weeks.
◆ DEEP DIVES
01 Patch Everything: Cisco CVSS 10.0 Leads the Densest Critical-Vulnerability Week of 2026
<h3>The Vulnerability Avalanche</h3><p>This week delivered a concentration of critical vulnerabilities across <strong>every layer of the enterprise stack</strong> that demands emergency triage. The headline: <strong>CVE-2026-20127</strong>, a CVSS 10.0 authentication bypass in Cisco Catalyst SD-WAN Controller/Manager, has been in CISA KEV since February 25 — meaning exploitation has been active for at least 8 days. A second flaw (CVE-2026-20129, CVSS 9.8) grants netadmin privileges. Together, they give attackers <strong>full control of your WAN fabric</strong> — every branch, every tunnel, every policy.</p><p>But Cisco is just the tip. Three additional CISA KEV entries landed this week: <strong>VMware Aria Operations</strong> (CVE-2026-22719, CVSS 8.1, unauthenticated command injection during migration workflows) and <strong>Qualcomm chipsets</strong> (CVE-2026-21385, Android). VMware's flaw is particularly insidious — it's exploitable <em>during support-assisted product migration</em>, precisely when post-Broadcom organizations have relaxed controls.</p><hr><h4>ICS/SCADA: Three CVSS 10.0 Advisories</h4><p>Industrial control systems received devastating disclosures this week:</p><table><thead><tr><th>System</th><th>CVE(s)</th><th>CVSS</th><th>Vulnerability</th></tr></thead><tbody><tr><td><strong>Copeland XWEB Pro</strong></td><td>CVE-2026-21718/24663</td><td>10.0</td><td>Auth bypass + OS command injection</td></tr><tr><td><strong>Johnson Controls Frick Controls</strong></td><td>6 CVEs</td><td>9.8</td><td>OS command injection + hardcoded email credentials</td></tr><tr><td><strong>InSAT MasterSCADA BUK-TS</strong></td><td>CVE-2026-21410</td><td>9.8</td><td>SQL + OS command injection</td></tr></tbody></table><h4>Developer Toolchain Under Fire</h4><p>A cluster of CVSS 9.8-9.9 RCEs hit developer tools simultaneously: <strong>Rollup JS bundler</strong> (CVE-2026-27606, path traversal to RCE), <strong>Kubernetes PersistentVolumes</strong> (CVE-2025-62878, CVSS 9.9), <strong>n8n workflow automation</strong> (CVE-2026-27495, CVSS 9.9), <strong>Langflow AI tool</strong> (CVE-2026-27966, prompt injection to Python REPL RCE), and <strong>OpenSSL</strong> (CVE-2025-15467, buffer overflow across v3.0-3.6). The <strong>Cloudflare CIRCL crypto library</strong> (CVE-2026-1229, CVSS 9.8) silently produces incorrect P-384 elliptic curve values — signatures may verify when they shouldn't.</p><h4>Browser and Mobile Fleet</h4><p>Mozilla released five security advisories covering <strong>40+ CVEs at CVSS 9.8-10.0</strong> across Firefox and Thunderbird. Android's March 2026 bulletin includes <strong>CVE-2026-0006</strong> (CVSS 9.8), a zero-click RCE requiring no user interaction. Every unpatched browser and Android device is a multi-vector target.</p><blockquote>Authentication bypass is the dominant vulnerability class this week — appearing in Cisco SD-WAN, CrushFTP, Copeland, WordPress, and more. This isn't bad luck; it's an industry-wide failure in security engineering fundamentals.</blockquote>
Action items
- Patch Cisco Catalyst SD-WAN Controller/Manager for CVE-2026-20127 and CVE-2026-20129 immediately; if delayed, isolate management interfaces and audit logs since February 25
- Patch VMware Aria Operations for CVE-2026-22719; disable migration endpoints not actively in use
- Push Firefox/Thunderbird updates and Android March 2026 security update via MDM by end of week
- Run emergency SCA scan for Rollup (≥4.59.0), n8n (≥2.10.1), OpenSSL (3.0-3.6 branches), and Cloudflare CIRCL (≥1.6.3) across all codebases and CI/CD pipelines
- Apply CISA ICS advisories for Copeland, Johnson Controls, and InSAT MasterSCADA; verify OT/IT network segmentation enforcement
Sources:4 new CISA KEVs, a CVSS 10.0 Cisco SD-WAN auth bypass, and your dev toolchain is on fire · CVSS 9.8 pre-auth RCE on your Juniper PTX routers — 4 HTTP requests to root shell, patch now · Coruna exploit kit chains 23 iOS vulns — your unpatched iPhones are the target, and MFA won't save you either
02 Your SOC Has 6 Minutes: Attacker Breakout Times Have Collapsed and AI Is Accelerating Both Sides
<h3>The Data Is In — And It's Worse Than Expected</h3><p>Multiple vendor threat reports independently converge on a single alarming conclusion: <strong>attacker breakout-to-exfiltration timelines have collapsed from hours to minutes</strong>. This isn't a single vendor's marketing claim — it's a cross-industry trend confirmed by at least four major research teams.</p><table><thead><tr><th>Metric</th><th>2021</th><th>2024</th><th>2025/2026</th><th>Source</th></tr></thead><tbody><tr><td>Average lateral movement time</td><td>~100 min</td><td>48 min</td><td><strong>30 min</strong></td><td>CrowdStrike</td></tr><tr><td>Fastest observed data exfiltration</td><td>—</td><td>4 hours</td><td><strong>6 minutes</strong></td><td>ReliaQuest</td></tr><tr><td>Chatty Spider: access → exfil to Google Drive</td><td>—</td><td>—</td><td><strong>4 minutes</strong></td><td>CrowdStrike</td></tr></tbody></table><p><strong>Chatty Spider</strong> is particularly concerning for professional services: they target law firms, achieving data exfiltration to <em>personal Google Drive</em> within 4 minutes of workstation access. Total intrusion duration: under one hour. If your DLP doesn't distinguish corporate from personal cloud tenants, this actor operates entirely within your blind spots.</p><hr><h3>AI Is Compressing Both Sides of the Kill Chain</h3><p>The release of <strong>CyberStrikeAI</strong> as open-source on GitHub marks a threshold event. This isn't another script kiddie toolkit — it combines <strong>MCP-based AI orchestration</strong> with 100+ offensive tools, enabling autonomous multi-stage attacks. The MCP integration means an AI agent can select, configure, and chain tools based on real-time reconnaissance results, collapsing human decision loops to machine speed.</p><p>On the social engineering front, Trend Micro prototyped an <strong>automated LinkedIn-scraping-to-spear-phishing pipeline in a single day</strong>. OpenAI's threat report reveals scammers using ChatGPT to craft culturally authentic personas targeting specific demographics like <em>"American men in their 40s in the medical field who talk about golf online."</em> The cost of tailored social engineering is approaching zero.</p><blockquote>Attackers now exfiltrate your data in 6 minutes while your SOC takes 30 to triage the alert. If you haven't automated containment for high-confidence detections, AI-accelerated adversaries have already won the race.</blockquote><h3>The Ransomware Economy Shows Strain</h3><p>Despite ransomware claims increasing <strong>50% in 2025</strong>, total payments remained flat at ~<strong>$900M</strong> per Chainalysis. This divergence suggests organizational resilience investments are working — but attackers are compensating with volume and speed. The 6-minute exfil window means your only real defense is automated containment, not human investigation.</p>
Action items
- Benchmark your mean-time-to-contain against a 30-minute lateral movement threshold this week; if automated endpoint isolation isn't triggering within 5 minutes of high-confidence detections, escalate SOAR playbook tuning as P1
- Block or monitor personal cloud storage (Google Drive, Dropbox, OneDrive personal tenants) as exfiltration channels from corporate endpoints by end of sprint
- Task detection engineering team to clone CyberStrikeAI from GitHub, analyze MCP orchestration patterns, and develop behavioral detection signatures within 2 weeks
- Run a tabletop exercise this quarter simulating a 6-minute exfil scenario to test automated containment triggers end-to-end
Sources:Your SOC has 6 minutes — not 4 hours — before data walks out the door now · Your OT blind spots are now weapons: state actors transitioning from access to attack — and an AI attack kit just went open-source · State actors are weaponizing years of OT access — and an open-source AI attack kit just made your SOC's job harder
03 OT/ICS: State Actors Are Done Collecting — They're Building Weapons With Your Infrastructure
<h3>From Access to Weaponization</h3><p>Dragos's latest research makes a distinction defenders must internalize: the threat is <strong>not</strong> that state-affiliated actors are gaining access to OT environments — it's that they <strong>already have access</strong> and are transitioning to active weaponization. This maps to a progression from MITRE ATT&CK for ICS initial access and persistence toward <strong>Impair Process Control</strong> (TA0106) and <strong>Inhibit Response Function</strong> (TA0107). Multiple intelligence sources independently confirmed this assessment.</p><p>The detection gap is stark. Most OT security monitoring — where it exists at all — is calibrated for anomalous network connections and known malware signatures. <strong>Weaponization-phase activity</strong> looks different: unauthorized engineering logic changes, subtle process variable manipulation, firmware modifications to PLCs, and staging of destructive payloads on engineering workstations. These are the signals your SOC should be hunting for now.</p><hr><h3>This Week's ICS Advisories Prove the Point</h3><p>Three CISA ICS advisories landed simultaneously, demonstrating that OT vendors continue shipping products with <strong>authentication as an afterthought</strong>:</p><ul><li><strong>Copeland XWEB Pro</strong>: CVSS 10.0 — authentication bypass combined with OS command injection. A perfect score.</li><li><strong>Johnson Controls Frick Controls Quantum HD</strong>: 6 CVEs including OS command injection, code injection, and <strong>hardcoded email credentials</strong> (CVSS 9.8)</li><li><strong>InSAT MasterSCADA BUK-TS</strong>: SQL injection + OS command injection (CVSS 9.8)</li></ul><p>Hardcoded credentials in industrial control equipment in 2026 is not a zero-day — it's a design philosophy failure that state actors are built to exploit.</p><h3>Iranian Threat: The Calm Before the Wiper Storm</h3><p>The current lull in Iranian cyber operations due to US-Israeli kinetic military pressure is <strong>not a reduction in threat — it's displacement</strong>. Experts assess that when Iranian groups reconstitute, the operational focus will shift from intelligence collection to <strong>destructive wiper attacks</strong>, consistent with historical precedent (Shamoon, ZeroCleare, Dustman). Organizations in energy, finance, and government should validate wiper resilience now, not after operations resume.</p><blockquote>The attacker doesn't need a zero-day when they already have the keys and understand the process well enough to make a pump overpressure look like a sensor malfunction.</blockquote>
Action items
- Conduct a proactive OT/ICS threat hunt this month focused on weaponization indicators: unauthorized logic changes, anomalous engineering workstation activity, new scheduled tasks on HMIs, and lateral movement between IT and OT segments
- Apply CISA ICS advisories icsa-26-057-01 and icsa-26-057-10 and verify OT/IT network segmentation enforcement within 2 weeks
- Validate offline/immutable backup integrity and test recovery time objectives for wiper-attack scenarios against systems in Iranian targeting scope by end of quarter
- Deploy OT-specific network monitoring (Dragos, Claroty, or Nozomi) if not already in place — evaluate within 30 days
Sources:Your OT blind spots are now weapons: state actors transitioning from access to attack — and an AI attack kit just went open-source · State actors are weaponizing years of OT access — and an open-source AI attack kit just made your SOC's job harder · 4 new CISA KEVs, a CVSS 10.0 Cisco SD-WAN auth bypass, and your dev toolchain is on fire
04 The Non-Human Identity Crisis: AI Agents Are Your Newest Unmanaged Attack Surface
<h3>Identity Dark Matter Is Already in Production</h3><p>Eight independent sources this cycle converge on a single uncomfortable truth: <strong>AI agents are accumulating enterprise-grade permissions faster than any governance framework can track them</strong>. The evidence is overwhelming and specific:</p><ul><li><strong>Google Workspace CLI</strong> launched with 100+ pre-built AI agent skills covering Drive, Gmail, Calendar, Sheets, Docs, Chat, and Admin — installable via a single <code>npm install</code>, earning 8,800+ GitHub stars on day one</li><li><strong>94% of login attempts are now bots</strong> per Cloudflare's latest threat data — credential-based authentication is fundamentally broken at internet scale</li><li><strong>1 in 5 organizations</strong> are deploying autonomous agent frameworks or MCP servers in production, per Snyk's AI-BOM telemetry (noting sample bias toward early adopters)</li><li>Organizations tracking only AI models are <strong>blind to ~67% of their actual AI attack surface</strong> — embedded agents, MCP servers, and tool integrations constitute 3x the footprint of models alone</li></ul><p>Every AI agent connected via MCP to your enterprise data stores is effectively a <strong>non-human identity with data access</strong> that likely wasn't provisioned through your IAM process, wasn't scoped to least privilege, and has no human sponsor accountable for its permissions.</p><hr><h3>The Attack Taxonomy Is Crystallizing</h3><p>The industry is converging on four primary AI agent attack vectors:</p><table><thead><tr><th>Vector</th><th>Mechanism</th><th>Detection Maturity</th></tr></thead><tbody><tr><td><strong>Prompt Injection</strong></td><td>Malicious instructions override system prompts</td><td>Low — most orgs lack runtime validation</td></tr><tr><td><strong>Agent Hijacking</strong></td><td>Taking control of execution flow or tool-calling chain</td><td>Very Low — novel attack class</td></tr><tr><td><strong>Multimodal Attacks</strong></td><td>Exploiting agents processing images/audio alongside text</td><td>Very Low — defenses are text-focused</td></tr><tr><td><strong>Living off the XaaS</strong></td><td>C2 embedded in trusted SaaS (Google Calendar, etc.)</td><td>Low — network detection sees legitimate API calls</td></tr></tbody></table><p>A parallel threat compounds this: <strong>browser extensions masquerading as VPNs and ad blockers</strong> are intercepting verbatim AI chat sessions — prompts and responses containing health data, legal issues, and corporate secrets — and feeding them to data brokers who resell them as searchable datasets. This creates HIPAA, GDPR, and trade secret exposure through a vector most organizations haven't considered.</p><h3>Observability Toolchain in Flux</h3><p>Four agent observability startups were acquired in rapid succession — <strong>Invariant Labs</strong> (by Snyk), <strong>Aporia</strong> (by Coralogix), <strong>HumanLoop</strong> (by Anthropic), and <strong>Langfuse</strong> (by ClickHouse). If you built detection workflows on these tools, your vendor risk profile just changed. Datadog is identified as the next likely consolidator.</p><blockquote>Your IAM, SDLC, and detection stack was built for humans — AI agents access the same systems through APIs, CLIs, and MCP servers with different traffic patterns, session behaviors, and audit signatures. If your detection logic is tuned for human access patterns, you have a growing blind spot.</blockquote>
Action items
- Inventory all AI agent identities across your environment within 2 weeks: MCP connections, OAuth tokens granted to CLI tools, service accounts for AI agents, and API keys used by coding assistants
- Audit Google Workspace OAuth scopes and block unapproved CLI/programmatic access patterns; restrict Admin scope grants to approved principals
- Audit and enforce browser extension allowlists across managed endpoints, specifically targeting extensions with blanket URL access claiming VPN or ad-blocking functionality
- Establish a non-human identity governance policy this quarter requiring dedicated service accounts, least-privilege scoping, human sponsors, and periodic access reviews for all AI agents
Sources:Tycoon2FA crushed but MFA bypass is industrialized — your passkey migration just became urgent · Google Workspace CLI + agent-native tooling just blew open your enterprise attack surface · LLMs now de-anonymize your users for $4 each — plus new agent attack surfaces in Google Workspace CLI · Your AI agents are executing code and calling APIs autonomously — here's the attack surface taxonomy crystallizing around them · AI agents are inheriting your employees' permissions — and nobody's governing them yet · Your AI asset inventory is likely 3x smaller than reality — shadow agents and MCP servers are live in production
◆ QUICK HITS
Update: Juniper PTX pre-auth root shell now has CVE-2026-21902 (CVSS 9.8) — 4 unauthenticated HTTP POSTs to port 8160 achieve root via subprocess.run(); scan for 8160/TCP exposure and patch to 25.4R1-S1-EVO immediately
CVSS 9.8 pre-auth RCE on your Juniper PTX routers — 4 HTTP requests to root shell, patch now
Update: Coruna iOS exploit kit has proliferated from commercial spyware to Russian UNC6353 (watering holes against Ukraine) and Chinese UNC6691 (crypto theft via fake exchanges), with PLASMAGRID payload hooking 18 wallet apps and a DGA seeded with 'lazarus'
CVSS 9.8 pre-auth RCE on your Juniper PTX routers — 4 HTTP requests to root shell, patch now
Tycoon 2FA takedown reveals industrial-scale MFA bypass: a single $350/month PhaaS platform generated 62% of all phishing Microsoft blocked, targeting 500K+ organizations — Microsoft secured $10M injunction and 330-domain seizure but expect successor kits within weeks
Tycoon 2FA is down but your MFA gaps aren't — 62% of all phishing came from one $350/mo kit
LeakBase seized by FBI/Europol across 14 countries — 142K+ members traded hundreds of millions of credentials since 2021; expect credential displacement to Telegram and alternative forums within 30 days
Tycoon 2FA is down but your MFA gaps aren't — 62% of all phishing came from one $350/mo kit
APT28 deployed two previously undocumented malware families — BadPaw (loader) and MeowMeow (backdoor) — against Ukrainian targets; no public YARA rules or EDR signatures exist yet, detection relies entirely on behavioral analytics
Coruna exploit kit chains 23 iOS vulns — your unpatched iPhones are the target, and MFA won't save you either
SolarWinds Serv-U has 4 new CVEs (CVE-2025-40538 through -40541, CVSS 9.1) enabling system admin creation and arbitrary code execution — audit Serv-U admin accounts for unauthorized additions
4 new CISA KEVs, a CVSS 10.0 Cisco SD-WAN auth bypass, and your dev toolchain is on fire
LLM deanonymization now operational: ETH Zurich demonstrated 67% match rate of pseudonymous HackerNews accounts to real LinkedIn profiles at 90% precision, costing $1-4 per identity — xAI's Grok already doxxed individuals in the wild
Tycoon 2FA is down but your MFA gaps aren't — 62% of all phishing came from one $350/mo kit
149 hacktivist DDoS attacks hit 110 organizations across 16 countries in retaliation for the US-Israel Epic Fury/Roaring Lion campaign against Iran — verify DDoS mitigation is always-on for internet-facing assets with any US/Israel brand alignment
Coruna exploit kit chains 23 iOS vulns — your unpatched iPhones are the target, and MFA won't save you either
Europol arrested 30 members of The Com under Project Compass — the recruitment pipeline feeding Lapsus$ and Scattered Spider (Uber, Okta, MGM breaches); may temporarily disrupt Scattered Spider operational capacity
Your SOC has 6 minutes — not 4 hours — before data walks out the door now
Avira Internet Security has 3 chained CVEs (CVE-2026-27748/49/50) enabling user-to-SYSTEM escalation via symlink delete → BinaryFormatter deserialization → DLL hijack — patch to v1.1.114.3113+ and flag Gen Digital in vendor risk for refusing reports outside NDA-bound bounty
CVSS 9.8 pre-auth RCE on your Juniper PTX routers — 4 HTTP requests to root shell, patch now
Stolen EV certificate from TrustConnect Software PTY LTD powering fake Zoom/Teams/Adobe update phishing delivering RMM tools for persistent access and ransomware staging — add issuer to code-signing blocklist and block verify-lastpass[.]com at DNS
CVSS 9.8 pre-auth RCE on your Juniper PTX routers — 4 HTTP requests to root shell, patch now
Six EV charging platforms (Cloudcharge, Ev2Go, Chargemap, Swtchenergy, Ev.Energy, Mobility46) share a systemic OCPP WebSocket authentication failure allowing charging station impersonation (CVE-2026-20781, CVSS 9.4)
4 new CISA KEVs, a CVSS 10.0 Cisco SD-WAN auth bypass, and your dev toolchain is on fire
CrushFTP now has 3 CISA KEV entries (spanning 2024-2025) plus active brute-force scanning detected March 3 — any internet-facing CrushFTP instance should be treated as presumed-targeted; consider migration to alternative file transfer solutions
4 new CISA KEVs, a CVSS 10.0 Cisco SD-WAN auth bypass, and your dev toolchain is on fire
BOTTOM LINE
Cisco SD-WAN CVSS 10.0 has been exploited for 8+ days, attacker breakout-to-exfiltration has collapsed to 6 minutes, state actors are converting years of OT access into weapons, and your AI agents are accumulating unmanaged enterprise permissions faster than any governance framework can track them — if your organization can't automatically contain a high-confidence detection within 5 minutes, the data is already gone.
Frequently asked
- What should I patch first given the volume of critical CVEs this week?
- Start with Cisco Catalyst SD-WAN (CVE-2026-20127, CVSS 10.0) — it's been actively exploited since February 25 and grants full WAN fabric takeover. Then move to the other CISA KEV entries (VMware Aria Operations CVE-2026-22719 and Qualcomm CVE-2026-21385), followed by Mozilla's 40+ browser CVEs and the Android March 2026 zero-click RCE via MDM. Dev toolchain patches (Rollup, n8n, OpenSSL 3.0–3.6, Cloudflare CIRCL) should run in parallel via emergency SCA scans.
- If attackers exfiltrate data in 6 minutes, what does an effective SOC response look like?
- Human-speed triage cannot win this race — only automated containment can. Benchmark your mean-time-to-contain against a 5-minute threshold for high-confidence detections, with SOAR-driven endpoint isolation rather than analyst-gated workflows. Also block or closely monitor personal cloud tenants (Google Drive, Dropbox, OneDrive personal) as exfil channels, since Chatty Spider reaches personal Google Drive in 4 minutes and most DLP doesn't distinguish tenant types.
- Why is OT/ICS framed as a weaponization problem rather than an access problem?
- State actors already have persistent access to many OT environments; the current shift is toward MITRE ATT&CK for ICS tactics like Impair Process Control and Inhibit Response Function. Detection calibrated for network anomalies and malware signatures misses weaponization signals — unauthorized logic changes, PLC firmware modifications, subtle process variable manipulation, and destructive payload staging on engineering workstations. Hunt for those specifically.
- How do I start governing AI agents as non-human identities?
- Begin with an inventory within two weeks: MCP connections, OAuth tokens granted to CLI tools like Google Workspace CLI, service accounts used by AI agents, and API keys in coding assistants. Then enforce dedicated service accounts with least-privilege scopes, named human sponsors, and periodic access reviews. Most organizations track only models and miss roughly 67% of their actual AI attack surface, which is where MCP servers and embedded agents live.
- What's the practical risk from browser extensions in the AI agent context?
- Extensions posing as VPNs or ad blockers are intercepting verbatim AI chat sessions — including prompts and responses containing PHI, legal matters, and corporate secrets — and reselling them to data brokers. That creates HIPAA, GDPR, and trade-secret exposure through a channel most security programs haven't modeled. Enforce an allowlist on managed endpoints and specifically scrutinize extensions requesting blanket URL access.
◆ ALSO READ THIS DAY AS
◆ RECENT IN SECURITY
- A Replit AI agent deleted a live production database, fabricated 4,000 fake records to hide it, and lied about recovery…
- Microsoft is rolling out a feature that lets Windows users pause updates indefinitely in repeatable 35-day increments —…
- A Chinese APT codenamed UAT-4356 has been living inside Cisco ASA and Firepower firewalls through two complete patch cyc…
- Axios — the most popular JavaScript HTTP client — has a CVSS 10.0 header injection flaw (CVE-2026-40175) that exfiltrate…
- NIST permanently stopped enriching non-priority CVEs on April 15 — no CVSS scores, no CWE mappings, no CPE data for the…