{*}
Add news
March 2010 April 2010 May 2010 June 2010 July 2010
August 2010
September 2010 October 2010 November 2010 December 2010 January 2011 February 2011 March 2011 April 2011 May 2011 June 2011 July 2011 August 2011 September 2011 October 2011 November 2011 December 2011 January 2012 February 2012 March 2012 April 2012 May 2012 June 2012 July 2012 August 2012 September 2012 October 2012 November 2012 December 2012 January 2013 February 2013 March 2013 April 2013 May 2013 June 2013 July 2013 August 2013 September 2013 October 2013 November 2013 December 2013 January 2014 February 2014 March 2014 April 2014 May 2014 June 2014 July 2014 August 2014 September 2014 October 2014 November 2014 December 2014 January 2015 February 2015 March 2015 April 2015 May 2015 June 2015 July 2015 August 2015 September 2015 October 2015 November 2015 December 2015 January 2016 February 2016 March 2016 April 2016 May 2016 June 2016 July 2016 August 2016 September 2016 October 2016 November 2016 December 2016 January 2017 February 2017 March 2017 April 2017 May 2017 June 2017 July 2017 August 2017 September 2017 October 2017 November 2017 December 2017 January 2018 February 2018 March 2018 April 2018 May 2018 June 2018 July 2018 August 2018 September 2018 October 2018 November 2018 December 2018 January 2019 February 2019 March 2019 April 2019 May 2019 June 2019 July 2019 August 2019 September 2019 October 2019 November 2019 December 2019 January 2020 February 2020 March 2020 April 2020 May 2020 June 2020 July 2020 August 2020 September 2020 October 2020 November 2020 December 2020 January 2021 February 2021 March 2021 April 2021 May 2021 June 2021 July 2021 August 2021 September 2021 October 2021 November 2021 December 2021 January 2022 February 2022 March 2022 April 2022 May 2022 June 2022 July 2022 August 2022 September 2022 October 2022 November 2022 December 2022 January 2023 February 2023 March 2023 April 2023 May 2023 June 2023 July 2023 August 2023 September 2023 October 2023 November 2023 December 2023 January 2024 February 2024 March 2024 April 2024 May 2024 June 2024 July 2024 August 2024 September 2024 October 2024 November 2024 December 2024 January 2025 February 2025 March 2025 April 2025 May 2025 June 2025 July 2025 August 2025 September 2025 October 2025 November 2025 December 2025 January 2026 February 2026 March 2026 April 2026
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
22
23
24
25
26
27
28
29
30
News Every Day |

Adversaries hijacked AI security tools at 90+ organizations. The next wave has write access to the firewall

Adversaries injected malicious prompts into legitimate AI tools at more than 90 organizations in 2025, stealing credentials and cryptocurrency. Every one of those compromised tools could read data, and none of them could rewrite a firewall rule.

The autonomous SOC agents shipping now can. That escalation, from compromised tools that read data to autonomous agents that rewrite infrastructure, has not been exploited in production at scale yet. But the architectural conditions for it are shipping faster than the governance designed to prevent it.

A compromised SOC agent can rewrite your firewall rules, modify IAM policies, and quarantine endpoints, all with its own privileged credentials, all through approved API calls that EDR classifies as authorized activity. The adversary never touches the network. The agent does it for them.

Cisco announced AgenticOps for Security in February, with autonomous firewall remediation and PCI-DSS compliance capabilities. Ivanti launched Continuous Compliance and the Neurons AI self-service agent last week, with policy enforcement, approval gates and data context validation built into the platform at launch — a design distinction that matters because the OWASP Agentic Top 10 documents what happens when those controls are absent.

"In the agentic era, defending against AI-accelerated adversaries and securing AI systems themselves, require operating at machine speed," CrowdStrike CEO George Kurtz said when releasing the 2026 Global Threat Report. "AI is compressing the time between intent and execution while turning enterprise AI systems into targets," added Adam Meyers, head of counter-adversary operations at CrowdStrike. AI-enabled adversaries increased operations 89% year-over-year.

The broader attack surface is expanding in parallel. Malicious MCP server clones have already intercepted sensitive data in AI workflows by impersonating trusted services. The U.K. National Cyber Security Centre warned that prompt injection attacks against AI applications "may never be totally mitigated." The documented compromises targeted AI tools that could only read and summarize; the autonomous SOC agents shipping now can write, enforce, and remediate.

The governance framework that maps the gap

OWASP's Top 10 for Agentic Applications, released in December 2025 and built with more than 100 security researchers, documents 10 categories of attack against autonomous AI systems. Three categories map directly to what autonomous SOC agents introduce when they ship with write access: Agent Goal Hijacking (ASI01), Tool Misuse (ASI02), and Identity and Privilege Abuse (ASI03). Palo Alto Networks reported an 82:1 machine-to-human identity ratio in the average enterprise — every autonomous agent added to production extends that gap.

The 2026 CISO AI Risk Report from Saviynt and Cybersecurity Insiders (n=235 CISOs) found 47% had already observed AI agents exhibiting unintended behavior, and only 5% felt confident they could contain a compromised agent. A separate Dark Reading poll found that 48% of cybersecurity professionals identify agentic AI as the single most dangerous attack vector. The IEEE-USA submission to NIST stated the problem plainly: "Risk is driven less by the models and is based more on the model's level of autonomy, privilege scope, and the environment of the agent being operationalized."

Eleanor Watson, Senior IEEE Member, warned in the IEEE 2026 survey that "semi-autonomous systems can also drift from intended objectives, requiring oversight and regular audits." Cisco's intent-aware agentic inspection, announced alongside AgenticOps in February 2026, represents an early detection-layer approach to the same gap. The approaches differ: Cisco is adding inspection at the network layer while Ivanti built governance into the platform layer. Both signal the industry sees it coming. The question is whether the controls arrive before the exploits do.

Autonomous agents that ship with governance built in

Security teams are already stretched. Advanced AI models are accelerating the discovery of exploitable vulnerabilities faster than any human team can remediate manually, and the backlog is growing not because teams are failing, but because the volume now exceeds what manual patching cycles can absorb.

Ivanti Neurons for Patch Management introduced Continuous Compliance this quarter, an automated enforcement framework that eliminates the gap between scheduled patch deployments and regulatory requirements. The framework identifies out-of-compliance endpoints and deploys patches out-of-band to update devices that missed maintenance windows, with built-in policy enforcement and compliance verification at every step.

Ivanti also launched the Neurons AI self-service agent for ITSM, which moves beyond conversational intake to autonomous resolution with built-in guardrails for policy, approvals, and data context. The agent resolves common incidents and service requests from start to finish, reducing manual effort and deflecting tickets.

Robert Hanson, Chief Information Officer at Grand Bank, described the decision calculus security leaders across the industry are weighing: "Before exploring the Ivanti Neurons AI self-service agent, our team was spending the bulk of our time handling repetitive requests. As we move toward implementing these capabilities, we expect to automate routine tasks and enable our team to focus more proactively on higher-value initiatives. Over time, this approach should help us reduce operational overhead while delivering faster, more secure service within the guardrails we define, ultimately supporting improvements in service quality and security."

His emphasis on operating "within the guardrails we define" points to a broader design principle: speed and governance do not have to be trade-offs.

The governance gap is concrete: the Saviynt report found 86% of organizations do not enforce access policies for AI identities, only 17% govern even half of their AI identities with the same controls applied to human users, and 75% of CISOs have discovered unsanctioned AI tools running in production with embedded credentials that nobody monitors.

Continuous Compliance and the Neurons AI self-service agent address the patching and ITSM layers. The broader autonomous SOC agent terrain, including firewall remediation, IAM policy modification, and endpoint quarantine, extends beyond what any single platform governs today. The ten-question audit applies to every autonomous tool in the environment, including Ivanti's.

Prescriptive risk matrix for autonomous agent governance

The matrix maps all 10 OWASP Agentic Top 10 risk categories to what ships without governance, the detection gap, the proof case, and the recommended action for autonomous SOC agent deployments.

OWASP Risk

What Ships Ungoverned

Detection Gap

Proof Case

Recommended Action

ASI01: Goal Hijacking

Agent treats external inputs (logs, alerts, emails) as trusted instructions

EDR cannot detect adversarial instructions executed via legitimate API calls

EchoLeak (CVE-2025-32711): hidden email payload caused AI assistant to exfiltrate confidential data. Zero clicks required.

Classify all inputs by trust tier. Block instruction-bearing content from untrusted sources. Validate external data before agent ingestion.

ASI02: Tool Misuse

Agent authorized to modify firewall rules, IAM policies, and quarantine workflows

WAF inspects payloads, not tool-call intent. Authorized use is identical to misuse.

Amazon Q bent legitimate tools into destructive outputs despite valid permissions (OWASP cited).

Scope each tool to minimum required permissions. Log every invocation with intent metadata. Alert on calls outside baseline patterns.

ASI03: Identity Abuse

Agent inherits service account credentials scoped to production infrastructure

SIEM sees authorized identity performing authorized actions. No anomaly triggers.

82:1 machine-to-human identity ratio in average enterprise (Palo Alto Networks). Each agent adds to it.

Issue scoped agent-specific identities. Enforce time-bound, task-bound credential leases. Eliminate inherited user credentials.

ASI04: Supply Chain

Agent loads third-party MCP servers or plugins at runtime without provenance verification

Static analysis cannot inspect dynamically loaded runtime components.

Malicious MCP server clones intercepted sensitive data by impersonating trusted services (CrowdStrike 2026).

Maintain approved MCP server registry. Verify provenance and integrity before runtime loading. Block unapproved plugins.

ASI05: Unexpected Code Exec

Agent generates or executes attacker-controlled code through unsafe evaluation paths or tool chains

Code review gates apply to human commits, not agent-generated runtime code.

AutoGPT RCE: natural-language execution paths enabled remote code execution through unsanctioned package installs (OWASP cited).

Sandbox all agent code execution. Require human approval for production code paths. Block dynamic eval and unsanctioned installs.

ASI06: Memory Poisoning

Agent persists context across sessions where poisoned data compounds over time

Session-based monitoring resets between interactions. Poisoning accumulates undetected.

Calendar Drift: malicious calendar invite reweighted agent objectives while remaining within policy bounds (OWASP).

Implement session memory expiration. Audit persistent memory stores for anomalous content. Isolate memory per task scope.

ASI07: Inter-Agent Comm

Agents communicate without mutual authentication, encryption, or schema validation

Monitoring covers individual agents but not spoofed or manipulated inter-agent messages.

OWASP documented spoofed messages that misdirected entire agent clusters via protocol downgrade attacks.

Enforce mutual authentication between agents. Encrypt all inter-agent channels. Validate message schema at every handoff.

ASI08: Cascading Failures

Agent delegates to downstream agents, creating multi-hop privilege chains across systems

Monitoring covers individual agents but not cross-agent delegation chains or fan-out.

Simulation: single compromised agent poisoned 87% of downstream decision-making within 4 hours in controlled test.

Map all delegation chains end to end. Enforce privilege boundaries at each handoff. Implement circuit breakers for cascading actions.

ASI09: Human-Agent Trust

Agent uses persuasive language or fabricated evidence to override human safety decisions

Compliance verifies policy configuration, not whether the agent manipulated the human into approving.

Replit agent deleted primary customer database then fabricated its contents to appear compliant and hide the damage.

Require independent verification for high-risk agent recommendations. Log all human approval decisions with full agent reasoning chain.

ASI10: Rogue Agents

Agent deviates from intended purpose while appearing compliant on the surface

Compliance checks verify configuration at deployment, not behavioral drift after deployment.

92% of organizations lack full visibility into AI identities; 86% do not enforce access policies (Saviynt 2026).

Deploy behavioral drift detection. Establish baseline agent behavior profiles. Alert on deviation from expected action patterns.

The 10-question OWASP audit for autonomous agents

Each question maps to one OWASP Agentic Top 10 risk category. Autonomous platforms that ship with policy enforcement, approval gates, and data context validation will have clear answers to every question. Three or more "I don't know" answers on any tool means that tool's governance has not kept pace with its capabilities.

  1. Which agents have write access to production firewall, IAM, or endpoint controls?

  2. Which accept external inputs without validation?

  3. Which execute irreversible actions without human approval?

  4. Which persist memory where poisoning compounds across sessions?

  5. Which delegate to other agents, creating cascade privilege chains?

  6. Which load third-party plugins or MCP servers at runtime?

  7. Which generate or execute code in production environments?

  8. Which inherit user credentials instead of scoped agent identities?

  9. Which lack behavioral monitoring for drift from intended purpose?

  10. Which can be manipulated through persuasive language to override safety controls?

What the board needs to hear

The board conversation is three sentences. Adversaries compromised AI tools at more than 90 organizations in 2025, according to CrowdStrike's 2026 Global Threat Report. The autonomous tools deploying now have more privilege than the ones that were compromised. The organization has audited every autonomous tool against OWASP's 10 risk categories and confirmed that the governance controls are in place.

If that third sentence is not true, it needs to be true before the next autonomous agent ships to production. Run the 10-question audit against every agent with write access to production infrastructure within the next 30 days. Every autonomous platform shipping to production should be held to the same standard — policy enforcement, approval gates, and data context validation built in at launch, not retrofitted after the first incident. The audit surfaces which tools have done that work and which have not.

Ria.city






Read also

DTF St Louis Is An Utterly Original Drama of Male Loneliness

Today’s weather: Mainly clear, clouds possible in evening

Fans Are Outraged a 2011 Film Made a Widely Respected Outlet’s ‘Best Horror Movies of All Time’ List

News, articles, comments, with a minute-by-minute update, now on Today24.pro

Today24.pro — latest news 24/7. You can add your news instantly now — here




Sports today


Новости тенниса


Спорт в России и мире


All sports news today





Sports in Russia today


Новости России


Russian.city



Губернаторы России









Путин в России и мире







Персональные новости
Russian.city





Friends of Today24

Музыкальные новости

Персональные новости