aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDataset
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

AI Sec Watch

The security intelligence platform for AI teams

AI security threats move fast and get buried under hype and noise. Built by an Information Systems Security researcher to help security teams and developers stay ahead of vulnerabilities, privacy incidents, safety research, and policy developments.

[TOTAL_TRACKED]
2,657
[LAST_24H]
7
[LAST_7D]
154
Daily BriefingMonday, March 30, 2026
>

Anthropic's Leaked "Mythos" Model Raises Dual-Use Security Concerns: An unreleased Anthropic AI model called Mythos was accidentally exposed through a configuration error, revealing advanced reasoning and coding abilities specifically aimed at cybersecurity. The model's improved capability to find and exploit software vulnerabilities, plus its ability to autonomously fix its own code problems, could enable both more sophisticated cyberattacks and better defenses.

>

Mistral Secures $830M for European AI Data Center: French AI startup Mistral raised $830 million in debt financing to build a Paris-area data center with thousands of Nvidia GPUs (specialized chips used for AI training) to train its large language models, aiming for 200 MW of European computing capacity by 2027.

Latest Intel

page 42/266
VIEW ALL
01

CVE-2025-68613: n8n Improper Control of Dynamically-Managed Code Resources Vulnerability

security
Mar 10, 2026

n8n, a workflow automation tool, has a vulnerability in how it handles dynamically managed code resources (code that is created or modified while the program runs), which allows attackers to execute arbitrary code remotely on affected systems. This vulnerability is currently being actively exploited by attackers in the wild.

Critical This Week5 issues
critical

CVE-2025-15379: A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the `_

CVE-2025-15379NVD/CVE DatabaseMar 30, 2026
Mar 30, 2026
>

Critical Command Injection in MLflow Model Deployment: MLflow has a command injection vulnerability (where an attacker inserts malicious commands into input that gets executed) in its model serving code when deploying models with `env_manager=LOCAL`. The flaw allows attackers to execute arbitrary commands on deployment systems by inserting malicious content into the `python_env.yaml` file, which MLflow reads and uses in shell commands without validation. (CVE-2025-15379, Critical)

Fix: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services (a government directive for managing cloud security), or discontinue use of the product if mitigations are unavailable.

CISA Known Exploited Vulnerabilities
02

March Patch Tuesday: Three high severity holes in Microsoft Office

security
Mar 10, 2026

Microsoft's March Patch Tuesday release includes three high-severity vulnerabilities in Office: an information disclosure flaw in Excel (CVE-2026-26144) that can leak data through improper input handling, and two remote code execution bugs (CVE-2026-26113 and CVE-2026-26110) caused by memory handling errors that could let attackers run malicious code. These vulnerabilities are particularly dangerous because they can be triggered through routine document handling and preview features without requiring user interaction.

Fix: If patch deployment must be delayed, organizations should restrict outbound network traffic from Office applications, monitor unusual network requests from Excel processes, and disable or limit AI-driven automation features such as Copilot Agent mode to reduce exposure.

CSO Online
03

CVE-2026-31829: Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.0.13, Flowise expose

security
Mar 10, 2026

Flowise, a tool for building custom AI workflows with a drag-and-drop interface, had a vulnerability before version 3.0.13 where its HTTP Node allowed attackers to perform SSRF (server-side request forgery, forcing a server to make requests to internal resources it shouldn't access) by sending requests to private networks or internal systems that are normally hidden from the public internet. This vulnerability is fixed in 3.0.13.

Fix: Update Flowise to version 3.0.13 or later.

NVD/CVE Database
04

Microsoft backs Anthropic in Pentagon blacklist battle, urges temporary restraining order

policy
Mar 10, 2026

Microsoft is supporting Anthropic, an AI company that was recently banned by the Pentagon as a supply chain risk (a security designation historically used for foreign adversaries), by asking a court to temporarily block the ban so both sides can negotiate. The dispute arose because Anthropic wanted safeguards against its AI models being used for autonomous weapons or mass surveillance, while the Pentagon wanted unrestricted access for any lawful military purpose.

Fix: Microsoft advocates for a temporary restraining order that would allow Anthropic and the Department of Defense to pursue a 'negotiated resolution that will better serve all involved and avoid wide-ranging business impacts,' giving both parties 'time and a process to find common ground.' No specific technical fix or system update is mentioned in the source.

CNBC Technology
05

Musk’s xAI wins permit for datacenter’s makeshift power plant despite backlash

industry
Mar 10, 2026

Elon Musk's AI company xAI received approval to operate 41 methane gas turbines at its Mississippi datacenter to power its AI supercomputers (large arrays of specialized computing chips used to train and run AI models), nearly doubling its current power capacity. These turbines will provide electricity for xAI's infrastructure that supports Grok, the company's AI chatbot product.

The Guardian Technology
06

The Government Must Not Force Companies to Participate in AI-powered Surveillance

policysafety
Mar 10, 2026

Anthropic, an AI company, refused to let the U.S. Department of Defense use its large language model (LLM, an AI trained on large amounts of text data) technology for surveillance, and the Pentagon retaliated by labeling the company a "supply chain risk." Anthropic is now asking courts to block this designation, arguing that forcing a company to change its code violates the First Amendment. The article explains that the government already collects vast amounts of personal data and uses AI to analyze it, creating risks for privacy and free speech, so companies should be allowed to add guardrails (safety limits built into AI systems) without government punishment.

EFF Deeplinks Blog
07

Amazon launches its healthcare AI assistant on its website and app

industrysafety
Mar 10, 2026

Amazon has launched Health AI, a healthcare assistant available on its website and app that can answer health questions, explain medical records, and manage appointments by accessing users' health information through a secure nationwide system. While Amazon says Health AI operates in a HIPAA-compliant environment (meaning it follows healthcare privacy rules) and trains its models on abstracted patterns rather than identifiable patient data, researchers warn that companies may use user conversations for training purposes, though Amazon did not provide specific details about encryption methods or access controls.

TechCrunch
08

Meta gets into social networks for AI agents with acquisition of viral Moltbook platform

industry
Mar 10, 2026

Meta has acquired Moltbook, a social media platform designed specifically for AI agents (software programs that can autonomously perform tasks). The acquisition brings Moltbook's leadership into Meta's AI division and reflects growing interest in AI agents that can interact with each other and complete real-world tasks like managing calendars and sending emails.

CNBC Technology
09

The CSO role is evolving fast with AI in Cyber Defense strategy

securitypolicy
Mar 10, 2026

Organizations face increasing cybersecurity challenges as AI becomes a double-edged sword, used by both attackers and defenders to identify threats. The key competitive advantage is not AI alone, but rather teams of skilled humans working together with AI tools, supported by strong resources and threat intelligence, to defend against AI-augmented attacks that can now be launched globally without geographic limitations.

Fix: According to the source, best practices for CISOs and CIOs include: 'It is important for CIOs and CISOs to have a clear Buy-in from employees, stakeholders, C-level, board for AI journey. Implement AI in a safe and cost-effective way with all stakeholders in the know-how of the roadmap.' Additionally, the source recommends that security leaders should examine threat intelligence and recent attack techniques, map organizational assets to identify vulnerabilities, and ensure defense strategies are international in scope rather than localized.

CSO Online
10

v0.14.16

security
Mar 10, 2026

This release (v0.14.16) of llama-index-core includes multiple security and stability fixes, including a critical security patch that adds RestrictedUnpickler to prevent unsafe deserialization (CWE-502, a vulnerability where untrusted data can be converted back into Python objects in unsafe ways). The update also introduces new rate-limiting features, fixes async/await issues that could block operations, and improves how the system handles tool calls and API retries across various AI model integrations.

Fix: Update to llama-index-core version 0.14.16 or later. The security fix is implemented in commit #20857: 'add RestrictedUnpickler to SimpleObjectNodeMapping (CWE-502)'.

LlamaIndex Security Releases
Prev1...4041424344...266Next
critical

CVE-2026-33873: Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.9.0, the Agentic Assis

CVE-2026-33873NVD/CVE DatabaseMar 27, 2026
Mar 27, 2026
critical

Attackers exploit critical Langflow RCE within hours as CISA sounds alarm

CSO OnlineMar 27, 2026
Mar 27, 2026
critical

CVE-2025-53521: F5 BIG-IP Unspecified Vulnerability

CVE-2025-53521CISA Known Exploited VulnerabilitiesMar 26, 2026
Mar 26, 2026
critical

CISA: New Langflow flaw actively exploited to hijack AI workflows

BleepingComputerMar 26, 2026
Mar 26, 2026