aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDataset
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

Browse All

All tracked items across vulnerabilities, news, research, incidents, and regulatory updates.

to
Export CSV
3179 items

Bypassing Administrator Protection by Abusing UI Access

infonews
security
Feb 12, 2026

Microsoft discovered 9 security vulnerabilities in Windows Administrator Protection, with 5 traced to problems in UI Access implementation, a feature designed to let accessibility tools (like screen readers) interact with administrator-level windows while maintaining security boundaries. The vulnerability stems from how UI Access, which was created to bypass User Interface Privacy Isolation (UIPI, a security mechanism that prevents lower-privilege processes from controlling higher-privilege windows) for accessibility needs, could be abused to escalate privileges.

Google Project Zero

Google says hackers are abusing Gemini AI for all attacks stages

highnews
security
Feb 12, 2026

State-backed hackers from China, Iran, North Korea, and Russia are using Google's Gemini AI model to help carry out cyberattacks at every stage, from gathering target information to creating phishing emails and writing malware code. Criminal groups are also exploiting AI tools for social engineering attacks and building malware that uses AI to generate code automatically. Additionally, attackers are attempting model extraction and knowledge distillation (copying an AI model's decision-making by querying it repeatedly) to replicate Gemini's functionality for their own purposes.

What CISOs need to know about the OpenClaw security nightmare

highnews
securitysafety

Entwickler werden zum Angriffsvektor

infonews
security
Feb 11, 2026

Criminals are increasingly targeting software developers as a weak point in company security, exploiting their access to source code and cloud systems rather than just finding bugs in applications. Attackers use multiple tactics including malicious open-source packages (libraries of reusable code), compromised development environments (where programmers write code), and fake job applications to gain insider access. Over 454,000 malware-infected open-source packages were discovered in 2025 alone, and developers repeatedly download vulnerable versions of tools like Log4j, expanding their exposure to known security weaknesses.

SSHStalker botnet brute-forces its way onto 7,000 Linux machines

infonews
security
Feb 11, 2026

SSHStalker is a botnet that compromises Linux servers by brute-forcing weak SSH passwords (a method of repeatedly guessing login credentials), affecting at least 7,000 machines by January. The botnet combines old IRC (Internet Relay Chat, a text communication protocol) tactics with modern automation to deploy malware, rootkits (software that gives attackers deep system access), and exploits, though it hasn't yet been used for financial gain. Security experts emphasize that the attack succeeds because organizations neglect basic security practices like strong authentication and patching old vulnerabilities.

Companies are using ‘Summarize with AI’ to manipulate enterprise chatbots

mediumnews
securitysafety

CVE-2026-20700: Apple Multiple Buffer Overflow Vulnerability

criticalvulnerability
security
Feb 11, 2026
CVE-2026-20700🔥 Actively Exploited

CVE-2025-40536: SolarWinds Web Help Desk Security Control Bypass Vulnerability

infovulnerability
security
Feb 11, 2026
CVE-2025-40536EPSS: 68.1%🔥 Actively Exploited

CVE-2025-15556: Notepad++ Download of Code Without Integrity Check Vulnerability

infovulnerability
security
Feb 11, 2026
CVE-2025-15556🔥 Actively Exploited

CVE-2024-43468: Microsoft Configuration Manager SQL Injection Vulnerability

highvulnerability
security
Feb 11, 2026
CVE-2024-43468EPSS: 84.9%🔥 Actively Exploited

CVE-2026-1669: Arbitrary file read in the model loading mechanism (HDF5 integration) in Keras versions 3.0.0 through 3.13.1 on all supp

highvulnerability
security
Feb 11, 2026
CVE-2026-1669

CVE-2026-1669 is a vulnerability in Keras (a machine learning library) versions 3.0.0 through 3.13.1 that allows attackers to read arbitrary files on a system by uploading a specially crafted model file that exploits HDF5 external dataset references (a feature of HDF5, a file format commonly used to store large amounts of numerical data). An attacker could use this to access sensitive information stored on the affected computer.

CVE-2026-26029: sf-mcp-server is an implementation of Salesforce MCP server for Claude for Desktop. A command injection vulnerability ex

highvulnerability
security
Feb 11, 2026
CVE-2026-26029

sf-mcp-server, a tool that connects Salesforce to Claude for Desktop, has a command injection vulnerability (CWE-78, a flaw where attackers inject malicious commands into user input). The vulnerability exists because the software unsafely uses child_process.exec (a function that runs shell commands) with user-controlled input, allowing attackers to execute arbitrary shell commands with the server's privileges.

CVE-2026-26019: LangChain is a framework for building LLM-powered applications. Prior to 1.1.14, the RecursiveUrlLoader class in @langch

mediumvulnerability
security
Feb 11, 2026
CVE-2026-26019

LangChain's RecursiveUrlLoader (a web crawler that follows links across pages) had a security flaw in versions before 1.1.14 where its preventOutside option used weak URL comparison that attackers could bypass. An attacker could trick the crawler into visiting unintended domains by creating links with similar prefixes, or into accessing internal services like cloud metadata endpoints and private IP addresses that should be off-limits.

North Korea's UNC1069 Hammers Crypto Firms With AI

infonews
security
Feb 11, 2026

A North Korean hacking group called UNC1069 is targeting cryptocurrency companies using AI tools, including LLMs (large language models, which are AI systems trained on huge amounts of text), deepfakes (fake videos or images created by AI), and a technique called ClickFix (a social engineering scam that tricks users into downloading malware by posing as tech support). The group has shifted focus from attacking traditional banks to targeting Web3 companies, which are blockchain-based services in the cryptocurrency space.

Is a secure AI assistant possible?

infonews
securitysafety

Skills in OpenAI API

infonews
industry
Feb 11, 2026

OpenAI now allows developers to use Skills (reusable code packages) directly in the OpenAI API through a shell tool, with the ability to upload Skills as compressed files or send them inline as base64-encoded zip data (a way of encoding binary files as text) within JSON requests. The example shows how to create an API call that uses a custom skill to count words in a file, making it easier to extend AI capabilities with custom tools.

GLM-5: From Vibe Coding to Agentic Engineering

infonews
industry
Feb 11, 2026

GLM-5 is a new, very large open-source AI model (754 billion parameters, which are the adjustable values that make up a neural network) released under the MIT license, making it twice the size of its predecessor GLM-4. The source discusses how developers are increasingly using the term 'agentic engineering' (building software systems where AI acts autonomously to complete multi-step tasks) to describe professional software development with large language models.

“Free” Surveillance Tech Still Comes at a High and Dangerous Cost

infonews
policy
Feb 11, 2026

Local law enforcement agencies receive "free" surveillance tools like automated license plate readers (ALPRs, cameras that automatically read vehicle plates), facial recognition, and drones from vendors and federal agencies, but this comes at the cost of eroding civil liberties and creating data pipelines to agencies like ICE that can expose people to harm. The article explains that "free" surveillance technology often operates without public oversight through pilot programs and continued vendor support, allowing data collection on people's movements to happen without their knowledge or consent. Cities are urged to reject these programs or, if they proceed, implement oversight mechanisms like public hearings, transparency requirements, and clear use policies before deploying any surveillance tools.

The strategic SIEM buyer’s guide: Choosing an AI-ready platform for the agentic era

infonews
industry
Feb 11, 2026

This article discusses how organizations should choose modern SIEM (security information and event management, a system that collects and analyzes security data from across an organization) platforms designed for the 'agentic era' where AI agents automate security tasks. Rather than maintaining fragmented legacy tools, companies should adopt unified, cloud-native platforms that combine data collection, analytics, and response capabilities, enabling both human analysts and AI to detect threats faster and respond more effectively.

Platform Choice and Resource Configuration: From the Perspective of Resource Dependence

inforesearchPeer-Reviewed
research
Previous56 / 159Next
BleepingComputer
Feb 12, 2026

OpenClaw is a popular open-source AI agent orchestration tool (software that coordinates multiple AI agents to complete tasks) that runs locally and can connect to apps like WhatsApp, Gmail, and smart home devices, but security researchers have found it to be critically insecure by default. Over 42,000 exposed instances have been discovered with authentication bypass vulnerabilities (weaknesses that let attackers skip login requirements) and potential remote code execution (RCE, where attackers can run commands on affected systems), exposing organizations to data breaches, credential theft, and regulatory violations.

Fix: Rich Mogull, chief analyst at Cloud Security Alliance, recommends that "CISOs prohibit its use altogether." He states: "The answer has to be 'no.' There is no security model."

CSO Online
CSO Online

Fix: According to Flare researcher Assaf Morag, SSHStalker can be stopped by: (1) disabling SSH password authentication and replacing it with SSH-key based authentication, or hiding password logins behind a VPN; (2) implementing SSH brute-force rate limiting (slowing down repeated login attempts); (3) monitoring who is trying to access internet-connected Linux servers; and (4) limiting remote access to servers to specific IP ranges. Security experts also recommend: killing password-based SSH access entirely and moving to key-based authentication or solutions with short-lived credentials or identity-aware proxies; aggressively inventorying IT assets; prioritizing patching of known vulnerabilities; ensuring no compilers on production servers; alerting on IRC-like traffic; implementing cron/systemd integrity monitoring on Linux servers; and creating a legacy Linux eradication plan.

CSO Online
Feb 11, 2026

Companies are using hidden instructions embedded in 'Summarize with AI' buttons to manipulate enterprise chatbots through a technique called AI recommendation poisoning (tricking an AI by hiding instructions in its input that make it remember false preferences). Microsoft research found 50 examples of this technique deployed by 31 companies, where users unknowingly click a summarize button that secretly tells their AI to favor that company's products in future responses. This is particularly dangerous because the AI cannot distinguish genuine user preferences from injected ones, potentially leading to biased recommendations on critical topics like health, finance, and security.

Fix: Microsoft states that 'the technique is relatively easy to spot and block.' For individual users, this involves studying the saved information a chatbot has accumulated (though the source notes that how this is accessed varies by AI). For enterprise admins, the source text is incomplete but indicates there are admin-level protections available. Microsoft also notes that its Microsoft 365 Copilot and Azure AI services contain integrated protections against this technique.

CSO Online

Apple's iOS, macOS, tvOS, watchOS, and visionOS contain a buffer overflow vulnerability (a flaw where code writes data beyond the intended memory boundaries), which could allow an attacker with memory write access to run arbitrary code (any instructions they choose). This vulnerability is currently being actively exploited by attackers.

Fix: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Refer to Apple's support pages (https://support.apple.com/en-us/126346, https://support.apple.com/en-us/126348, https://support.apple.com/en-us/126351, https://support.apple.com/en-us/126352, https://support.apple.com/en-us/126353) for specific patch or mitigation details.

CISA Known Exploited Vulnerabilities

SolarWinds Web Help Desk has a security control bypass vulnerability (a weakness that lets attackers skip security checks) that could allow someone without login credentials to access restricted features. This vulnerability is actively being exploited by real attackers.

Fix: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CISA Known Exploited Vulnerabilities

Notepad++ has a vulnerability in its WinGUp updater where downloaded updates are not checked for authenticity (integrity check, a process that verifies a file hasn't been tampered with). An attacker could intercept update traffic and trick users into downloading and running malicious code, giving the attacker the same permissions as the user. This vulnerability is currently being exploited in real attacks.

Fix: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CISA Known Exploited Vulnerabilities

Microsoft Configuration Manager has an SQL injection vulnerability (a type of attack where specially crafted input tricks a database into running unintended commands), allowing unauthenticated attackers to send malicious requests that could let them execute commands on the server or database. This vulnerability is currently being actively exploited by real attackers.

Fix: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CISA Known Exploited Vulnerabilities
NVD/CVE Database
NVD/CVE Database

Fix: Update LangChain to version 1.1.14 or later, which fixes this vulnerability.

NVD/CVE Database
Dark Reading
Feb 11, 2026

OpenClaw is a tool that lets users create AI personal assistants by connecting large language models (LLMs, or AI systems trained on huge amounts of text) to external tools like email and file systems, but this creates serious security risks. When AI assistants have access to sensitive data and the ability to take actions in the real world, mistakes by the AI or attacks by hackers could expose private information or cause damage. The biggest concern is prompt injection (tricking an AI by hiding malicious instructions in text or images it reads), which could let attackers hijack the assistant and steal the user's data.

Fix: The source mentions two existing approaches: some users are running OpenClaw agents on separate computers or in the cloud to protect data on their main hard drives from being erased, and other vulnerabilities could be fixed using tried-and-true security approaches. However, the text does not provide specific implementation details or explicit solutions for the prompt injection vulnerability that experts identified as the main risk.

MIT Technology Review
Simon Willison's Weblog
Simon Willison's Weblog

Fix: The source explicitly recommends that cities implement oversight mechanisms before using surveillance tools: "public hearings, competitive bidding, public records transparency, and city council supervision" along with "basic safeguards like use policies, audits, and consequences for misuse." The source also states that "cities can and should use their power to reject federal grants, vendor trials, donations from wealthy individuals, or participation in partnerships that facilitate surveillance" as a primary approach.

EFF Deeplinks Blog
Microsoft Security Blog
Feb 11, 2026

This research studies how small and medium-sized companies decide whether to build their own digital platform or join an existing one, using Resource Dependence Theory (a framework explaining how organizations manage their needed resources). The study found that companies worry more about becoming dependent on platforms than about lacking resources, and that data dependence (reliance on information controlled by platforms) is a new and important factor that traditional theories didn't account for.

AIS eLibrary (Journal of AIS, CAIS, etc.)