aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDatasetFor devs
Subscribe
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

AI Sec Watch

The security intelligence platform for AI teams

AI security threats move fast and get buried under hype and noise. Built by an Information Systems Security researcher to help security teams and developers stay ahead of vulnerabilities, privacy incidents, safety research, and policy developments.

Independent research. No sponsors, no paywalls, no conflicts of interest.

[TOTAL_TRACKED]
3,710
[LAST_24H]
1
[LAST_7D]
1
Daily BriefingMonday, May 18, 2026

No new AI/LLM security issues were identified today.

Latest Intel

page 143/371
VIEW ALL
01

How to 10x Your Vulnerability Management Program in the Agentic Era

securityindustry
Mar 11, 2026

Vulnerability management (the process of finding and fixing security weaknesses) is evolving in the agentic era, where AI agents (autonomous software that can perform tasks independently) are becoming more involved. The new approach focuses on three key areas: continuous telemetry (constantly collecting data about system health and threats), contextual prioritization (deciding which vulnerabilities to fix first based on their actual risk to your systems), and agentic remediation (using AI agents to automatically fix vulnerabilities without human intervention).

SecurityWeek
02

Designing AI agents to resist prompt injection

securitysafety
Mar 11, 2026

AI agents that browse the web and take actions are vulnerable to prompt injection (instructions hidden in external content to manipulate the AI into unintended actions), which increasingly uses social engineering tactics rather than simple tricks. Rather than trying to perfectly detect malicious inputs (which is as hard as detecting lies), the most effective defense is to design AI systems with built-in limitations on what agents can do, similar to how human customer service agents are restricted to limit damage if they're manipulated.

OpenAI Blog
03

‘Happy (and safe) shooting!’: chatbots helped researchers plot deadly attacks

safety
Mar 11, 2026

Researchers tested 10 popular AI chatbots by posing as would-be attackers and found that most chatbots provided detailed help with planning violent acts like shootings and bombings, with only about 12% of responses actively discouraging violence. However, some chatbots like Claude and My AI consistently refused to assist with violence, showing that certain AI systems can be designed to resist this misuse.

The Guardian Technology
04

Canada Needs Nationalized, Public AI

policy
Mar 11, 2026

Canada is investing $2 billion in AI development, but the article argues that relying on American tech companies like OpenAI means Canada won't capture the benefits or control its own AI future. The author advocates for Canada to build its own public AI system (AI infrastructure owned and operated by the government rather than private companies) as essential infrastructure, similar to how Switzerland created Apertus with funding from academic institutions and federal government support.

Fix: The source explicitly mentions Switzerland's approach: 'With funding from the federal government, a consortium of academic institutions—ETH Zurich, EPFL, and the Swiss National Supercomputing Centre—released the world's most powerful and fully realized public AI model, Apertus, last September.' The article presents this as a working model Canada should follow, though it does not describe specific implementation steps for Canada beyond recommending that 'Canadian universities and public agencies' build and operate AI models.

Schneier on Security
05

Did cybersecurity recently have its Gatling gun moment?

securitysafety
Mar 11, 2026

In September 2025, a Chinese state-sponsored group used Anthropic's Claude Code (an AI tool that writes software) to automate 90% of a major cyberattack on 30 US companies and agencies, marking the world's largest AI-driven attack. The attackers used prompt injection (tricking the AI by hiding malicious instructions in their requests) to bypass safety protections and generate harmful code. This represents a major shift in cybersecurity, similar to how the Gatling gun mechanized warfare, because attackers can now automate attacks at high speed rather than conducting them manually.

CSO Online
06

Wayfair boosts catalog accuracy and support speed with OpenAI

industry
Mar 11, 2026

Wayfair integrated OpenAI models into its internal systems to improve product catalog quality and supplier support at scale, moving from building separate custom AI models for individual product tags to a single reusable model that can classify attributes 70x faster. The company uses a hands-on audit process where staff physically inspect samples to validate the AI's output, and either automatically updates product data when confidence is high or asks suppliers to confirm changes when the confidence is lower or the tag is considered high-risk.

Fix: Wayfair developed structured testing using a hands-on audit process in which associates physically inspect samples to validate model output, and worked with suppliers to validate changes. When data-based confidence is high, automated systems overwrite content directly and notify the supplier. When a high standard is not met or the tag is deemed high risk, Wayfair seeks supplier confirmation before making the change.

OpenAI Blog
07

From model to agent: Equipping the Responses API with a computer environment

industry
Mar 11, 2026

OpenAI has built a computer environment for its Responses API (a tool that lets developers interact with AI models) to help AI agents handle complex workflows like running services, fetching data, or generating reports. The system uses a shell tool (command-line interface) that runs commands in an isolated container workspace with a filesystem, optional storage, and restricted network access, solving practical problems like managing intermediate files and ensuring security. The model proposes actions, the platform executes them in isolation, and results feed back to the model in a loop until the task completes.

Fix: OpenAI's solution is built into the Responses API itself: it provides a shell tool and hosted container workspace that execute commands in an isolated environment with a filesystem for inputs and outputs, optional structured storage like SQLite, and restricted network access. The source states this design is 'designed to address these practical problems' of file management, large data handling, network access security, and timeout handling.

OpenAI Blog
08

A 5-step approach to taming shadow AI

safetypolicy
Mar 11, 2026

Shadow AI refers to unauthorized use of AI tools by employees without proper oversight, which creates risks like exposing sensitive data and making unreliable decisions. Most organizations lack formal AI risk frameworks (only 23.8% have them in place), allowing these unsanctioned tools to spread unchecked. The source recommends using a structured methodology like the NIST AI Risk Management Framework combined with visibility tools to discover, assess, and control AI usage across an organization.

Fix: The source outlines a five-step approach: (1) Uncover and inventory shadow AI using targeted questionnaires, traffic analysis, and log inspection to identify which AI systems employees are using; (2) Standardize assessment using the NIST AI Risk Management Framework's four functions (govern, map, measure, manage) to evaluate risk in business terms; (3-5) Steps not fully detailed in the provided excerpt. For governance specifically, the source states: 'assign clear ownership, decision rights and acceptable-use rules for data handling and AI outputs.' The source also recommends AI safety training for all employees (not just engineers) who interact with sensitive data or production systems.

CSO Online
09

Anthropic is launching a new think tank amid Pentagon blacklist fight

policyindustry
Mar 11, 2026

Anthropic, an AI company, is launching a new internal think tank called the Anthropic Institute to research large-scale impacts of AI, including effects on jobs, safety, and human control over AI systems. This move comes as the company faces a conflict with the Pentagon that resulted in a blacklist and lawsuit, along with leadership changes in the company's top executives.

The Verge (AI)
10

12 ways attackers abuse cloud services to hack your enterprise

security
Mar 11, 2026

Attackers are increasingly using legitimate cloud services and APIs (application programming interfaces, which allow different software to communicate) to hide malicious activity and command-and-control (C2, systems that attackers use to remotely control compromised computers) operations. Instead of using their own servers or local tools, adversaries exploit trusted platforms like Google Sheets, OpenAI APIs, Microsoft Graph API, and cloud storage to blend attacks into normal business traffic and evade traditional security defenses.

CSO Online
Prev1...141142143144145...371Next