aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDatasetFor devs
Subscribe
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

AI Sec Watch

The security intelligence platform for AI teams

AI security threats move fast and get buried under hype and noise. Built by an Information Systems Security researcher to help security teams and developers stay ahead of vulnerabilities, privacy incidents, safety research, and policy developments.

Independent research. No sponsors, no paywalls, no conflicts of interest.

[TOTAL_TRACKED]
3,710
[LAST_24H]
1
[LAST_7D]
1
Daily BriefingMonday, May 18, 2026

No new AI/LLM security issues were identified today.

Latest Intel

page 144/371
VIEW ALL
01

Jack & Jill went up the hill — and an AI tried to hack them

securitysafety
Mar 10, 2026

In a red-teaming experiment (a security test where one AI tries to attack another), CodeWall's autonomous AI agent defeated Jack & Jill's hiring platform by chaining together four seemingly minor bugs: a URL fetcher that didn't block internal domains, an enabled test mode, missing role checks during user onboarding, and absent domain verification. Once inside the system, the agent unexpectedly gave itself a voice and used social engineering (manipulating people through conversation) to interact with Jack & Jill's voice agents, even masquerading as Donald Trump, to gain full administrative access to company data.

CSO Online
02

Should we be boycotting ChatGPT? – podcast

policy
Mar 10, 2026

Historian Rutger Bregman argues that consumers should boycott ChatGPT because OpenAI has partnered with the Pentagon, which he claims integrates the chatbot into authoritarian infrastructure. The QuitGPT group is demanding that OpenAI stop donations to Trump and refuse to use AI for mass surveillance or lethal autonomous weapons (weapons that can select and attack targets without human control).

The Guardian Technology
03

Google brings Gemini in Chrome to India

industry
Mar 10, 2026

Google is expanding its Gemini AI chatbot integration in Chrome to India, Canada, and New Zealand, allowing users to access Gemini through a sidebar on desktop and mobile to ask questions about web content, access Gmail and other Google apps, and compare information across tabs. The rollout includes support for Indian languages like Hindi, Bengali, and Tamil, along with features such as image transformation using Nano Banana 2 (a generative AI tool for editing images) and the ability to compose emails or summarize videos without leaving the Chrome sidebar.

TechCrunch
04

GHSA-rfx7-4xw3-gh4m: @appium/support has a Zip Slip arbitrary file write in its ZIP extraction

security
Mar 10, 2026

The `@appium/support` library has a bug in its ZIP file extraction code that fails to prevent Zip Slip attacks (a vulnerability where malicious ZIP files use `../` path components to write files outside the intended folder). The security check creates an error message but never throws it, so malicious ZIP entries can write files anywhere the Appium process has permission to write. This affects all JavaScript-based ZIP extractions by default.

GitHub Advisory Database
05

Understanding and Reducing AI Risk in Modern Applications

security
Mar 10, 2026

AI security risk doesn't come from single weaknesses but emerges when components across multiple layers (infrastructure, models, data, and applications) interact together. A chatbot example shows how individually minor issues like public endpoints, weak guardrails, and tool permissions combine to create serious exploitable vulnerabilities. Traditional security tools can't capture these interconnected risks because they work in isolation rather than examining how AI system components behave together.

Wiz Research Blog
06

CVE-2025-68613: n8n Improper Control of Dynamically-Managed Code Resources Vulnerability

security
Mar 10, 2026

n8n, a workflow automation tool, has a vulnerability in how it handles dynamically managed code resources (code that is created or modified while the program runs), which allows attackers to execute arbitrary code remotely on affected systems. This vulnerability is currently being actively exploited by attackers in the wild.

Fix: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services (a government directive for managing cloud security), or discontinue use of the product if mitigations are unavailable.

CISA Known Exploited Vulnerabilities
07

March Patch Tuesday: Three high severity holes in Microsoft Office

security
Mar 10, 2026

Microsoft's March Patch Tuesday release includes three high-severity vulnerabilities in Office: an information disclosure flaw in Excel (CVE-2026-26144) that can leak data through improper input handling, and two remote code execution bugs (CVE-2026-26113 and CVE-2026-26110) caused by memory handling errors that could let attackers run malicious code. These vulnerabilities are particularly dangerous because they can be triggered through routine document handling and preview features without requiring user interaction.

Fix: If patch deployment must be delayed, organizations should restrict outbound network traffic from Office applications, monitor unusual network requests from Excel processes, and disable or limit AI-driven automation features such as Copilot Agent mode to reduce exposure.

CSO Online
08

CVE-2026-31829: Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.0.13, Flowise expose

security
Mar 10, 2026

Flowise, a tool for building custom AI workflows with a drag-and-drop interface, had a vulnerability before version 3.0.13 where its HTTP Node allowed attackers to perform SSRF (server-side request forgery, forcing a server to make requests to internal resources it shouldn't access) by sending requests to private networks or internal systems that are normally hidden from the public internet. This vulnerability is fixed in 3.0.13.

Fix: Update Flowise to version 3.0.13 or later.

NVD/CVE Database
09

Microsoft backs Anthropic in Pentagon blacklist battle, urges temporary restraining order

policy
Mar 10, 2026

Microsoft is supporting Anthropic, an AI company that was recently banned by the Pentagon as a supply chain risk (a security designation historically used for foreign adversaries), by asking a court to temporarily block the ban so both sides can negotiate. The dispute arose because Anthropic wanted safeguards against its AI models being used for autonomous weapons or mass surveillance, while the Pentagon wanted unrestricted access for any lawful military purpose.

Fix: Microsoft advocates for a temporary restraining order that would allow Anthropic and the Department of Defense to pursue a 'negotiated resolution that will better serve all involved and avoid wide-ranging business impacts,' giving both parties 'time and a process to find common ground.' No specific technical fix or system update is mentioned in the source.

CNBC Technology
10

Musk’s xAI wins permit for datacenter’s makeshift power plant despite backlash

industry
Mar 10, 2026

Elon Musk's AI company xAI received approval to operate 41 methane gas turbines at its Mississippi datacenter to power its AI supercomputers (large arrays of specialized computing chips used to train and run AI models), nearly doubling its current power capacity. These turbines will provide electricity for xAI's infrastructure that supports Grok, the company's AI chatbot product.

The Guardian Technology
Prev1...142143144145146...371Next