aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDatasetFor devs
Subscribe
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

AI Sec Watch

The security intelligence platform for AI teams

AI security threats move fast and get buried under hype and noise. Built by an Information Systems Security researcher to help security teams and developers stay ahead of vulnerabilities, privacy incidents, safety research, and policy developments.

Independent research. No sponsors, no paywalls, no conflicts of interest.

[TOTAL_TRACKED]
3,710
[LAST_24H]
1
[LAST_7D]
1
Daily BriefingSaturday, May 16, 2026

No new AI/LLM security issues were identified today.

Latest Intel

page 79/371
VIEW ALL
01

The tabletop exercise grows up

securityindustry
Apr 8, 2026

Tabletop exercises (simulated crisis scenarios where teams discuss how they'd respond to incidents) have long been used in cybersecurity to test preparedness, but they have a key limitation: they test knowledge of plans rather than the ability to actually execute them, since scenarios follow a fixed script regardless of what the team decides. AI with agentic capabilities (AI systems that can take independent actions and adapt to changing conditions) now makes it possible to create dynamic tabletop exercises where simulated roles like threat actors or journalists respond in real time to the team's decisions instead of following a predetermined sequence.

Fix: The source text describes using 'AI agentic capabilities' to address the limitation, specifically stating that 'AI allows us to have an adversary that adapts to defensive decisions rather than following a' (the text cuts off here). The source indicates this would enable 'roles that were previously absent (e.g., the threat actor, the journalist, the regulator, the customer)' to 'respond to the team's decisions in real time rather than following a fixed sequence,' but does not provide specific implementation details, version numbers, or a complete explanation of how to deploy this solution.

CSO Online
02

Given Enough Agents, All Bugs Become Shallow

securityresearch
Apr 8, 2026

AI agents have become very skilled at finding bugs in code, especially security vulnerabilities, and can now identify and exploit previously unknown flaws much faster than before. A new AI model called Mythos Preview, created by Anthropic, succeeded at exploiting certain browser vulnerabilities 181 times compared to only twice for an earlier model, showing a major leap in AI's ability to find and exploit security weaknesses. This capability could make it easier for non-security experts to launch cyberattacks, though the article notes that deploying patches (fixes released by software companies) remains the biggest challenge for organizations trying to stay secure.

Fix: The source text does not explicitly describe a fix or mitigation strategy. It notes that 'the industry needs to adjust' with 'new innovations' to help with patch deployment, but does not specify what those innovations should be. N/A -- no mitigation discussed in source.

Embrace The Red
03

Introducing the Child Safety Blueprint

safetypolicy
Apr 8, 2026

OpenAI has introduced a Child Safety Blueprint, a policy framework designed to prevent AI-enabled child sexual exploitation (the use of AI to create, distribute, or facilitate child abuse material). The blueprint addresses three main areas: updating laws to handle AI-generated or altered CSAM (child sexual abuse material), improving how service providers report and coordinate with law enforcement, and building safety features directly into AI systems to detect and prevent misuse. The framework combines legal, operational, and technical approaches and was developed with input from organizations like the National Center for Missing and Exploited Children and state attorneys general.

Fix: The source explicitly mentions these approaches: 'modernizing laws to address AI-generated and altered CSAM, improving provider reporting and coordination to support more effective investigations, and building safety-by-design measures directly into AI systems to prevent and detect misuse.' The framework also emphasizes 'layered defenses — not a single technical control, but a combination of detection, refusal mechanisms, human oversight, and continuous adaptation to emerging misuse patterns.' The source notes that 'getting the prevention architecture right upstream is the single highest-leverage investment the industry can make in child safety.'

OpenAI Blog
04

CVE-2026-3357: IBM Langflow Desktop 1.6.0 through 1.8.2 Langflow could allow an authenticated user to execute arbitrary code on the sys

security
Apr 7, 2026

IBM Langflow Desktop versions 1.6.0 through 1.8.2 contain a vulnerability that allows an authenticated user (someone who has already logged in) to run arbitrary code on the system. The flaw stems from an insecure default setting that allows deserialization of untrusted data (converting data from an external source back into code without checking if it's safe) in the FAISS component (a component used for similarity searching).

NVD/CVE Database
05

GHSA-fjrm-76x2-c4q4: JWCrypto: JWE ZIP decompression bomb

security
Apr 7, 2026

JWCrypto version 1.5.6 has a weakness in its protection against decompression bomb attacks (where compressed data expands to huge sizes). The code only checks the size of the compressed input (limiting it to 250KB), but does not check the size of the decompressed output, allowing an attacker to send a small token that expands to 100MB or more in memory, causing denial of service (a crash from running out of memory) on resource-constrained devices.

Fix: The actual solution is implemented in version 1.5.7, as noted in the resolving commit. (The source does not provide explicit details of the fix itself, only that v1.5.7 contains the corrected implementation.)

GitHub Advisory Database
06

GHSA-r758-8hxw-4845: justhtml: Mutation XSS with custom foreign-namespace sanitization policies

security
Apr 7, 2026

A mutation XSS (cross-site scripting, where attackers inject malicious code through HTML) vulnerability was found in the justhtml library when using custom sanitization policies that preserve foreign namespaces like SVG or MathML. Specially crafted input could pass through sanitization appearing safe, but then become dangerous when a browser or parser processes it again. This only affects users with custom policies; the default settings are safe.

Fix: Upgrade to justhtml version 1.14.0 or later. If you cannot upgrade immediately, keep `drop_foreign_namespaces=True`, avoid allowlisting foreign namespaces for untrusted input, and avoid allowlisting raw-text containers such as `<style>` in custom policies.

GitHub Advisory Database
07

GHSA-69x8-hrgq-fjj8: LiteLLM: Password hash exposure and pass-the-hash authentication bypass

security
Apr 7, 2026

LiteLLM had three security flaws that combined to allow attackers to take over user accounts: passwords were stored using weak SHA-256 hashing without salt (making them easy to crack with rainbow tables, which are pre-computed lists of password hashes), the password hashes were exposed in API responses that any logged-in user could access, and the login endpoint accepted raw hashes instead of requiring the actual password (a vulnerability called pass-the-hash). An attacker could retrieve another user's password hash through the API and use it directly to log in as that user.

Fix: Fixed in v1.83.0. Passwords are now hashed with scrypt (a much stronger algorithm using a random 16-byte salt with parameters n=16384, r=8, p=1). Password hashes are stripped from all API responses. Existing SHA-256 hashes are transparently migrated to the new format on the user's next login.

GitHub Advisory Database
08

Google CEO Sundar Pichai says 'AI shift' opens opportunities to invest in startups

industry
Apr 7, 2026

Google CEO Sundar Pichai stated that the rapid growth of AI has created opportunities for Alphabet to invest billions of dollars in AI startups like Anthropic and other companies. Alphabet is moving away from traditional venture capital routes and instead making large direct investments from its own balance sheet, similar to how other major tech companies like Nvidia and Microsoft are operating. Pichai emphasized that the company wants to be a responsible steward of capital by investing in ventures with strong returns.

CNBC Technology
09

Elon Musk seeks ouster of OpenAI CEO Sam Altman as part of lawsuit

policy
Apr 7, 2026

Elon Musk is suing OpenAI CEO Sam Altman and President Greg Brockman, claiming they deceived him into donating $38 million by promising the company would remain a nonprofit when it later became a for-profit entity. In his legal filing, Musk is seeking to have both executives removed from their roles, asking the court to force OpenAI to revert to operating as a true nonprofit, with jury selection scheduled to begin in April 2025.

CNBC Technology
10

What Anthropic Glasswing reveals about the future of vulnerability discovery

securityindustry
Apr 7, 2026

Anthropic has launched Project Glasswing, an initiative using Claude Mythos Preview (an AI model designed for cybersecurity) to automatically discover software vulnerabilities at scale, which it is testing with a closed group of over 40 companies including Amazon, Microsoft, and Google. Early testing claims the model found thousands of high-severity vulnerabilities in widely-used software, including some that had been missed for decades, suggesting that AI-powered vulnerability discovery may shift how security work is organized and force organizations to focus less on managing backlogs and more on reducing the time vulnerabilities remain exposed before being fixed. The initiative raises questions about the future role of human-driven security work as AI automation becomes more capable.

CSO Online
Prev1...7778798081...371Next