aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDataset
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

Browse All

All tracked items across vulnerabilities, news, research, incidents, and regulatory updates.

to
Export CSV
3145 items

CVE-2026-27595: Parse Dashboard is a standalone dashboard for managing Parse Server apps. In versions 7.3.0-alpha.42 through 9.0.0-alpha

criticalvulnerability
security
Feb 24, 2026
CVE-2026-27595

Parse Dashboard versions 7.3.0-alpha.42 through 9.0.0-alpha.7 have security vulnerabilities in the AI Agent API endpoint that allow unauthenticated attackers to read and write data from any connected database using the master key (a special admin credential that grants full access). The agent feature must be enabled to be vulnerable, so dashboards without it are safe.

Fix: Upgrade to version 9.0.0-alpha.8 or later, which adds authentication, CSRF validation (protection against forged requests), and per-app authorization middleware to the agent endpoint. Alternatively, remove or comment out the agent configuration block from your Parse Dashboard configuration file as a temporary workaround.

NVD/CVE Database

India’s AI boom pushes firms to trade near-term revenue for users

infonews
industry
Feb 24, 2026

India has become the world's largest market for generative AI (artificial intelligence systems that can create text, images, and other content) app downloads in 2025, with installs jumping 207% year-over-year, but major AI companies like OpenAI and Google are now ending free promotional offers to convert users into paying subscribers. Despite India driving roughly 20% of global GenAI app downloads, it accounts for only about 1% of in-app purchases, and revenue has actually declined in recent months as companies rolled out cheaper or free options like ChatGPT Go. The challenge reflects a tension between rapid user growth and actual monetization (converting users into paying customers) in a price-sensitive market.

Pete Hegseth’s Pentagon AI bro squad includes a former Uber executive and a private equity billionaire

infonews
policy
Feb 24, 2026

This article discusses Pete Hegseth's appointments of prominent private-sector figures, including a former Uber executive and a private equity billionaire, to lead AI-related roles at the Pentagon's research and engineering division. The piece is part of a newsletter covering how wealthy influencers and business leaders are gaining influence over AI policy in Washington.

CVE-2022-20775: Cisco SD-WAN Path Traversal Vulnerability

infovulnerability
security
Feb 24, 2026
CVE-2022-20775🔥 Actively Exploited

CVE-2026-20127: Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability

infovulnerability
security
Feb 24, 2026
CVE-2026-20127🔥 Actively Exploited

Tech Companies Shouldn’t Be Bullied Into Doing Surveillance

infonews
policysafety

Spanish ‘soonicorn’ Multiverse Computing releases free compressed AI model

infonews
industry
Feb 24, 2026

Multiverse Computing, a Spanish startup, has released a free compressed AI model called HyperNova 60B 2602 that reduces the size of large language models (AI systems trained on massive amounts of text) to make them cheaper and faster to use. The company uses CompactifAI, a compression technology inspired by quantum computing (using principles from quantum mechanics to process information), to create models that are roughly half the size of the original while maintaining similar performance and accuracy. The model is now available for free on Hugging Face (a platform where developers share AI models) and includes improved support for tool calling and agentic coding (where AI systems can use external tools or plan sequences of actions).

OpenAI defeats xAI’s trade secrets lawsuit

infonews
policy
Feb 24, 2026

OpenAI won a legal case against xAI, which had sued claiming that OpenAI stole its trade secrets (confidential information that gives a company a competitive advantage) and hired away its employees. The judge ruled that xAI failed to prove OpenAI actually did anything wrong, noting that while eight former xAI employees did move to OpenAI, there was no evidence that OpenAI directed them to steal anything.

US threatens Anthropic with deadline in dispute on AI safeguards

infonews
policysafety

A I-designed proteins may help spot cancer

infonews
industry
Feb 24, 2026

MIT and Microsoft researchers used AI to design molecular sensors (short proteins called peptides) that can detect early signs of cancer through a urine test. Nanoparticles coated with these peptides are activated by proteases (enzymes that are overactive in cancer cells), producing a detectable signal when excreted in urine. AI-designed peptides are more effective than older trial-and-error methods because they can be optimized to be highly sensitive and specific to particular cancer-linked proteases.

What are the types of ransomware attacks?

infonews
security
Feb 24, 2026

Ransomware is a type of malware that cybercriminals use in different ways to extort money from victims, including crypto ransomware (which encrypts data), double extortion (which steals and threatens to leak data), locker ransomware (which blocks system access), and others. The source explains how different ransomware strains work and that crypto ransomware is the most common type because it combines encryption with pressure on victims to pay. Detection methods include behavior analysis (watching how files act suspiciously), signature-based detection (identifying known ransomware code patterns), heuristic analysis (finding new or modified threats), and deception technology (using fake files as bait to catch ransomware early).

Take control: Locking down common endpoint vulnerabilities

infonews
security
Feb 24, 2026

Endpoints (network-connected devices like laptops and servers) face common vulnerabilities that attackers exploit, particularly exposed Remote Desktop Protocol (RDP, a tool for remote access) which allows brute force attacks on passwords, and phishing emails that trick users into revealing credentials or installing malware. Both threats are preventable with proper security practices.

GHSA-mxhj-88fx-4pcv: Fickling: OBJ opcode call invisibility bypasses all safety checks

highvulnerability
security
Feb 24, 2026

Fickling, a tool for safely analyzing pickle files (Python's serialization format), has a critical vulnerability where the OBJ opcode (an instruction that calls functions) can execute dangerous code without being detected by any of Fickling's safety checks. The problem is that OBJ pushes function calls directly onto the interpreter's stack instead of recording them in the analysis structure (AST, or abstract syntax tree, which represents the code's structure), so when the result is discarded, the malicious call becomes invisible to all safety analysis.

Anthropic won’t budge as Pentagon escalates AI dispute

inforegulatory
policyindustry

Anthropic faces Friday deadline in Defense AI clash with Hegseth

inforegulatory
policy
Feb 24, 2026

Defense Secretary Pete Hegseth has given Anthropic (an AI company that develops Claude models) until Friday to allow the military broad access to its AI systems, threatening to label the company a 'supply chain risk' (a designation that would require DoD vendors to stop using Anthropic's products) or invoke the Defense Production Act (a law allowing the president to control domestic industries for national security) if it refuses. Anthropic wants safeguards preventing its models from being used for autonomous weapons or mass surveillance, while the DoD wants unrestricted access to 'all lawful use cases' without limitations.

GHSA-x76f-jf84-rqj8: Caddy: MatchHost becomes case-sensitive for large host lists (>100), enabling host-based route/auth bypass

highvulnerability
security
Feb 24, 2026
CVE-2026-27588

Caddy's MatchHost matcher is documented as case-insensitive, but when configured with more than 100 host entries, it uses an optimized binary search that performs case-sensitive comparison, allowing attackers to bypass host-based routing and access controls by changing the casing of the Host header (for example, sending 'H001.TEST' instead of 'h001.test').

GHSA-g7pc-pc7g-h8jh: Caddy: MatchPath %xx (escaped-path) branch skips case normalization, enabling path-based route/auth bypass

highvulnerability
security
Feb 24, 2026
CVE-2026-27587

Caddy's path matcher is supposed to be case-insensitive, but when a match pattern contains percent-escape sequences (encoded characters like %2F for a slash), it compares the request path without lowercasing it, allowing attackers to bypass access controls by changing letter casing (for example, requesting /ADMIN%2Fpanel instead of /admin%2Fpanel).

Why AMD's megadeal with Meta shows Nvidia is still the best game in town

infonews
industry
Feb 24, 2026

N/A -- This content is a footer/navigation page from CNBC with no substantive article text about AMD, Meta, Nvidia, or any AI/LLM-related technical issue. The provided material contains only website metadata, subscription prompts, and legal information.

GHSA-4xrr-hq4w-6vf4: Caddy: Improper sanitization of glob characters in file matcher may lead to bypassing security protections

mediumvulnerability
security
Feb 24, 2026
CVE-2026-27585

Caddy's file matcher doesn't properly escape backslashes when sanitizing glob patterns (special characters used for file matching), which allows attackers to bypass security protections. For example, a reverse proxy blocking `/documents/*` can be bypassed by requesting `/do%5ccuments/` (where `%5c` is a backslash) because the backslash in the glob pattern is treated as an escape character and ignored before non-special characters.

GHSA-m2cq-xjgm-f668: ActualBudget server is Missing Authentication for SimpleFIN and Pluggy AI bank sync endpoints

criticalvulnerability
security
Feb 24, 2026
CVE-2026-27584

ActualBudget server has a missing authentication vulnerability in its SimpleFIN and Pluggy.ai bank sync endpoints, allowing any unauthenticated attacker to access sensitive bank account balances and transaction history. The vulnerable endpoints (like POST /simplefin/accounts and POST /pluggyai/transactions) lack authentication middleware (code that verifies a user is logged in before allowing access), making this a critical issue for any ActualBudget server instance accessible over a network.

Previous38 / 158Next
TechCrunch
The Verge (AI)

Cisco SD-WAN contains a path traversal vulnerability (a bug where attackers can access files outside intended directories) that allows an authenticated local attacker to gain elevated privileges and execute arbitrary commands as the root user through improper access controls in the CLI (command-line interface, a text-based way to control software). This vulnerability is actively being exploited by attackers.

CISA Known Exploited Vulnerabilities

Cisco Catalyst SD-WAN Controller and Manager contain an authentication bypass vulnerability that allows remote attackers to skip the login process and gain administrative access without valid credentials. An attacker could exploit this flaw by sending specially crafted requests, then use the compromised access to manipulate network configuration through NETCONF (a network configuration protocol). This vulnerability is currently being actively exploited in real-world attacks.

Fix: According to the source, follow CISA's Emergency Directive 26-03 and CISA's Hunt and Hardening Guidance for Cisco SD-WAN Devices. The source also states to adhere to BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available. A due date of 2026-02-27 is specified for compliance.

CISA Known Exploited Vulnerabilities
Feb 24, 2026

The U.S. Department of Defense is pressuring Anthropic, an AI company, to allow their technology to be used for surveillance and autonomous weapons systems (weapons that operate without human control) by threatening to label them a 'supply chain risk' that would prevent other defense contractors from using their AI. Anthropic has publicly stated these are 'bright red lines' they will not cross, and the article argues they should maintain this position rather than give in to government pressure.

EFF Deeplinks Blog
TechCrunch
The Verge (AI)
Feb 24, 2026

The US Pentagon is threatening to remove AI company Anthropic from its supply chain and invoke the Defense Production Act (a law allowing the government to compel companies to produce goods for national security) unless Anthropic allows unrestricted use of its Claude AI chatbot for military applications by Friday evening. Anthropic has refused to allow its technology for certain uses, including autonomous kinetic operations (AI making final targeting decisions without human input) and mass domestic surveillance, citing safety concerns.

BBC Technology
MIT Technology Review

Fix: A layered approach that includes behavior analysis, signature-based detection, heuristic analysis, and deception technology is described as 'the best way to defend against ransomware' to protect against both known and unknown threats.

CSO Online

Fix: For RDP vulnerabilities: don't expose RDP to the public internet unless necessary, restrict admin rights, enforce multi-factor authentication (MFA, a security method requiring multiple forms of verification) for RDP sessions, apply Windows security configurations beyond defaults, and monitor for suspicious logins. For phishing attacks: conduct regularly scheduled security awareness training (SAT) to help users recognize malicious emails, use MFA to reduce damage if credentials are compromised, and don't respond directly to suspicious sender emails.

CSO Online

Fix: The vulnerability is described as "a single missing `new_variable()` call in `Obj.run()` (`fickle.py:1333-1350`)." The source indicates that REDUCE opcodes correctly persist calls to the AST using `interpreter.new_variable(call)`, and OBJ should follow the same pattern. The assessment section mentions a commit (https://github.com/trailofbits/fickling/commit/ff423dade2bb1f72b2b48586c022fac40cbd9a4a) that updates "the interpreter so it behaves closer to CPython when dealing with `OBJ`, `NEWOBJ`, and `NEWOBJ_EX` opcodes," suggesting this addresses the fix, though the exact patched version is not explicitly stated in the source.

GitHub Advisory Database
Feb 24, 2026

Anthropic, an AI company, is refusing to give the U.S. military unrestricted access to its AI model because of concerns about mass surveillance and autonomous weapons, despite the Pentagon threatening to declare the company a "supply chain risk" (a serious designation usually reserved for foreign adversaries) or invoke the Defense Production Act (a law giving the president power to force companies to prioritize production for national defense). The dispute highlights tension between corporate AI safety policies and government demands for military access, with experts warning that using these extreme measures could signal the U.S. is becoming unstable for business.

TechCrunch
CNBC Technology

Fix: The source suggests two fixes: (1) normalize exact hostnames to lower-case during MatchHost.Provision (at least for non-fuzzy entries), or (2) normalize the incoming request host to lower-case before the large-list binary search and equality check so the optimized path stays case-insensitive.

GitHub Advisory Database

Fix: In the percent-pattern matching path, lowercase the constructed string in matchPatternWithEscapeSequence right before path.Match, matching the behavior of the normal matching branch.

GitHub Advisory Database
CNBC Technology
GitHub Advisory Database

Fix: The source text shows that other integrations like GoCardless implement the fix by using `app.use(validateSessionMiddleware)` to add authentication middleware. This middleware must be added to the SimpleFIN and Pluggy.ai endpoint files (`/packages/sync-server/src/app-simplefin/app-simplefin.js` and `/packages/sync-server/src/app-pluggyai/app-pluggyai.js`) to require login before accessing the sensitive endpoints, similar to the example shown in `packages/sync-server/src/app-gocardless/app-gocardless.js`.

GitHub Advisory Database