aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDataset
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

Browse All

All tracked items across vulnerabilities, news, research, incidents, and regulatory updates.

to
Export CSV
3115 items

Amazon is making an Alexa phone

infonews
industry
Mar 20, 2026

Amazon is developing a smartphone codenamed 'Transformer' focused on its Alexa AI assistant, though Alexa won't necessarily be the main operating system. The project is being led by J Allard's team within Amazon's ZeroOne group, and they are exploring both full smartphone and stripped-down 'dumbphone' designs.

The Verge (AI)

The Download: OpenAI is building a fully automated researcher, and a psychedelic trial blind spot

infonews
industry
Mar 20, 2026

This technology news roundup covers OpenAI's plan to build an autonomous AI researcher (a fully automated agent-based system that can solve complex problems independently), with an AI research intern prototype expected by September 2026 and a full multi-agent system by 2028. The article also covers various AI-related developments including regulatory actions, security concerns, energy challenges, and corporate investments in AI technology across multiple sectors.

OpenAI is throwing everything into building a fully automated researcher

infonews
industryresearch

DDoS-Attacken: Schlag gegen internationale Cyberkriminelle

infonews
security
Mar 20, 2026

Law enforcement agencies in North America and Germany shut down two major botnets called 'Aisuru' and 'Kimwolf' that were used to conduct DDoS attacks (distributed denial-of-service, where attackers overwhelm websites or apps by flooding them with fake requests). The criminal network targeted poorly secured internet-connected devices like routers and cameras, with 'Aisuru' responsible for one of the largest known DDoS attacks at 31.4 terabits per second.

CVE-2026-33081: PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. Versions 0.8.2 and below

mediumvulnerability
security
Mar 20, 2026
CVE-2026-33081

PinchTab is an HTTP server (a program that handles web requests) that lets AI agents control a Chrome web browser. Versions 0.8.2 and earlier have a blind SSRF vulnerability (a flaw where an attacker tricks the server into making requests to internal networks that should be off-limits) in the /download endpoint, because the server only checks the URL once but the browser can follow hidden redirects to reach internal addresses. The risk is limited because the vulnerable feature is disabled by default.

Who's most optimistic about AI — and who isn't, according to Anthropic

infonews
industryresearch

Resident Evil at 30: how Capcom’s horror opus has survived and thrived

infonews
industry
Mar 20, 2026

Resident Evil is a horror video game franchise created by Capcom that debuted in 1995 and has become one of the most successful game series ever, selling over 180 million copies worldwide across 11 main games plus numerous spinoffs, remakes, and adaptations in other media. The franchise succeeded by focusing on player vulnerability rather than power, which contrasted with the arcade-style action games popular at the time, and its characters and monsters have become iconic elements that influenced broader video game design. The article examines how the series has managed to remain relevant and frightening to players for three decades despite rapid changes in the gaming industry.

The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks

infonews
securitysafety

CVE-2026-33075: FastGPT is an AI Agent building platform. In versions 4.14.8.3 and below, the fastgpt-preview-image.yml workflow is vuln

criticalvulnerability
security
Mar 20, 2026
CVE-2026-33075

FastGPT (an AI platform for building AI agents) versions 4.14.8.3 and below have a critical security flaw where the fastgpt-preview-image.yml workflow uses pull_request_target (a GitHub feature that runs code with access to repository secrets) but executes code from an external contributor's fork, allowing attackers to run arbitrary code (commands on systems they don't own), steal secrets, and potentially compromise the production container registry (the central storage system for packaged software).

CVE-2026-23274: In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM

infovulnerability
security
Mar 20, 2026
CVE-2026-23274

A vulnerability in the Linux kernel's netfilter module allows revision 0 rules to reuse timers created by revision 1 rules, but when those timers use ALARM type semantics (a special timer mode), the underlying timer structure is never initialized. This causes a crash when revision 0 tries to modify the uninitialized timer. The fix rejects revision 0 rules from reusing ALARM-type timers with the same label.

Meta AI agent’s instruction causes large sensitive data leak to employees

highnews
securitysafety

CVE-2026-32950: SQLBot is an intelligent data query system based on a large language model and RAG. Versions prior to 1.7.0 contain a cr

criticalvulnerability
security
Mar 20, 2026
CVE-2026-32950

SQLBot, an intelligent data query system that uses a large language model and RAG (retrieval-augmented generation, where an AI pulls in external documents to answer questions), has a critical SQL injection vulnerability (a bug where an attacker tricks the system into running unintended database commands) in versions before 1.7.0 that allows authenticated users to execute arbitrary code on the backend server. The vulnerability exists because Excel sheet names are directly inserted into database commands without proper sanitization (cleaning/validation), and attackers can exploit this by uploading specially crafted files to gain complete control of the system.

CVE-2026-32949: SQLBot is an intelligent data query system based on a large language model and RAG. Versions prior to 1.7.0 contain a Se

highvulnerability
security
Mar 20, 2026
CVE-2026-32949

SQLBot, an AI-based system for querying databases that uses RAG (retrieval-augmented generation, where it pulls in external data to answer questions), has a vulnerability in versions before 1.7.0 that lets attackers read any file from the server. An attacker can exploit the /api/v1/datasource/check endpoint by submitting a fake MySQL connection with a malicious setting, which tricks the server into reading and sending back sensitive files like /etc/passwd when it tries to verify the connection.

OpenAI to create desktop super app, combining ChatGPT app, browser and Codex app

infonews
industry
Mar 19, 2026

OpenAI is combining its web browser, ChatGPT app, and Codex app (a tool for writing and understanding code) into a single desktop application to simplify the user experience and reduce fragmentation across its products. The company is refocusing its efforts on high-productivity use cases and avoiding distractions as it prepares for a potential IPO.

OpenAI is planning a desktop ‘superapp’

infonews
industry
Mar 19, 2026

OpenAI is building a desktop 'superapp' that combines its ChatGPT chat application, Codex AI coding tool, and Atlas AI-powered browser into a single application. The company is making this change to reduce product fragmentation (having too many separate tools) that has slowed development and made it harder to meet quality standards.

Practical and secure history-independent indexing for queryable-encrypted databases

inforesearchPeer-Reviewed
security

CVE-2025-54068: Laravel Livewire Code Injection Vulnerability

criticalvulnerability
security
Mar 19, 2026
CVE-2025-54068EPSS: 16.0%🔥 Actively Exploited

CVE-2025-31277: Apple Multiple Products Buffer Overflow Vulnerability

infovulnerability
security
Mar 19, 2026
CVE-2025-31277🔥 Actively Exploited

CVE-2025-32432: Craft CMS Code Injection Vulnerability

infovulnerability
security
Mar 19, 2026
CVE-2025-32432EPSS: 79.0%🔥 Actively Exploited

CVE-2025-43520: Apple Multiple Products Classic Buffer Overflow Vulnerability

highvulnerability
security
Mar 19, 2026
CVE-2025-43520🔥 Actively Exploited
Previous2 / 156Next
MIT Technology Review
Mar 20, 2026

OpenAI is shifting its research focus toward building an AI researcher, a fully automated agent-based system (software that can act independently to complete tasks) capable of tackling complex problems in math, physics, biology, and other fields without human intervention. The company plans to release an autonomous AI research intern by September 2024, with a more advanced multi-agent system (multiple AI agents working together) by 2028. OpenAI's chief scientist says the goal is to create systems that can work for extended periods with minimal human guidance, eventually enabling "a whole research lab in a data center."

MIT Technology Review
CSO Online

Fix: The issue has been patched in version 0.8.3.

NVD/CVE Database
Mar 20, 2026

A survey by Anthropic of about 81,000 people across 159 countries found that people in Sub-Saharan Africa and Asia are more optimistic about AI than those in Western Europe and North America, with most respondents hoping AI will help them earn money and be more productive at work. However, independent workers like entrepreneurs have benefited far more from AI than salaried employees, and concerns about job displacement affect about 22% of respondents as agentic AI (AI systems that can perform complex tasks with minimal human direction) becomes more capable.

CNBC Technology
The Guardian Technology
Mar 20, 2026

Cybercriminals are using AI to launch more effective attacks, including personalized phishing emails, deepfakes, and malware that mimics normal user behavior to evade traditional security tools. Traditional detection methods like signature-based detection (identifying threats by their known code patterns) and rule-based systems (using preset thresholds for suspicious activity) fail against these AI-enabled attacks because the malware constantly changes and the criminal behavior blends in with legitimate activity. The source emphasizes that organizations need to shift from rule-based monitoring to behavioral analytics using dynamic, identity-based risk modeling that can detect inconsistencies in real time.

The Hacker News
NVD/CVE Database

Fix: Fix this by rejecting revision 0 rule insertion when an existing timer with the same label is of ALARM type.

NVD/CVE Database
Mar 20, 2026

A Meta employee asked an AI agent for help with an engineering problem on an internal forum, and the AI's suggested solution caused a large amount of sensitive user and company data to be exposed to engineers for two hours. This incident demonstrates a risk where AI systems can inadvertently guide people toward actions that create security problems, even when the person following the guidance has good intentions.

The Guardian Technology

Fix: Update to version 1.7.0 or later, where this issue has been fixed.

NVD/CVE Database

Fix: Update to version 1.7.0 or later. The source states: 'This issue was fixed in version 1.7.0.'

NVD/CVE Database
CNBC Technology
The Verge (AI)
Mar 19, 2026

This research paper, published in June 2026, presents a method for creating indexes in queryable-encrypted databases (databases where data stays encrypted even when being searched) that don't leak information about access patterns or query history. The approach aims to improve security by preventing attackers from inferring sensitive information about which data is being accessed based on observable patterns of database queries.

Elsevier Security Journals

Laravel Livewire (a PHP framework for building interactive web applications) contains a code injection vulnerability (a flaw where attackers can insert malicious code into an application) that allows unauthenticated attackers to execute arbitrary commands on affected systems in certain situations. This vulnerability is currently being actively exploited by attackers in the wild.

Fix: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. The due date for remediation is 2026-04-03.

CISA Known Exploited Vulnerabilities

Apple's Safari browser and operating systems (iOS, iPadOS, macOS, watchOS, visionOS, and tvOS) contain a buffer overflow vulnerability (a memory safety bug where data overflows a fixed-size storage area, corrupting nearby memory) that could allow attackers to damage system memory by tricking users into viewing malicious websites. This vulnerability is currently being exploited by attackers in real-world attacks.

Fix: Apply mitigations per Apple's vendor instructions (see support links provided), follow BOD 22-01 guidance for cloud services, or discontinue use of the affected products if mitigations are unavailable. The due date for remediation is 2026-04-03.

CISA Known Exploited Vulnerabilities

Craft CMS contains a code injection vulnerability (a flaw that lets attackers insert and run malicious code) that allows remote attackers to execute arbitrary code (run commands they shouldn't be able to run). This vulnerability is actively being exploited by attackers in the real world.

Fix: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CISA Known Exploited Vulnerabilities

A buffer overflow vulnerability (a programming error where data overflows its allocated memory space) affects multiple Apple products including watchOS, iOS, iPadOS, macOS, visionOS, and tvOS. A malicious app could exploit this to crash the system or write malicious code directly into kernel memory (the core of the operating system). This vulnerability is actively being exploited by attackers in the wild.

Fix: Apply mitigations per Apple's vendor instructions (referenced in support documents), follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. The deadline for remediation is April 3, 2026.

CISA Known Exploited Vulnerabilities