aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDatasetFor devs
Subscribe
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

Browse All

All tracked items across vulnerabilities, news, research, incidents, and regulatory updates.

to
Export CSV
4464 items

Human-centric failures: Why BEC continues to work despite MFA

infonews
security
May 1, 2026

Business email compromise (BEC, a scam where attackers trick employees into sending money by impersonating trusted contacts) continues to succeed even when organizations use MFA (multi-factor authentication, a security method requiring multiple forms of ID to access accounts) because attackers exploit human behavior and business processes rather than stealing credentials. Real attacks like the Toyota case (where an employee transferred $30 million based on a fake urgent email) and the Arup case (where deepfake technology impersonated a manager) show that the weakest point is often the human decision-maker approving payments, not the technical security controls.

Fix: The source explicitly recommends: (1) redesigning approval workflows so high-value transactions require multi-step verification including out-of-band calls (verification methods using a separate communication channel, like a phone call to confirm an email request); (2) simulating BEC scenarios in realistic exercises to identify gaps in response and decision-making; (3) embedding security awareness into daily routines using micro-learning and real incident reviews; (4) empowering teams to challenge unusual requests without fear of reprisal; (5) sharing instances of successful attacks with employees who distribute invoices and oversee financial decisions; and (6) explicitly defining what constitutes high-risk requests, such as first-time payments, changes to vendor banking details, sudden payment requests from executives, or requests that bypass standard procedures.

CSO Online

Managing OT risk at scale: Why OT cyber decisions are leadership decisions

infonews
security
May 1, 2026

OT (operational technology, the systems that control physical industrial processes like power plants or factories) cyber risk requires a different management approach than IT security because OT systems have long lifecycles, limited patching windows, and third-party dependencies that create unique vulnerabilities. The article argues that managing OT risk at scale is fundamentally a leadership and governance challenge rather than a purely technical problem, requiring consistent decision-making across all sites and clear accountability structures.

Enterprise Spotlight: Transforming software development with AI

infonews
industry
May 1, 2026

AI is changing how software is developed by affecting coding practices, tools, developer roles, and the overall development process across all stages, from initial planning through maintenance. The article discusses how AI agents are being integrated throughout the software development life cycle (the complete process of creating and maintaining software, from concept to deployment).

Hugging Face, ClawHub Abused for Malware Distribution

highnews
security
May 1, 2026

Threat actors are abusing AI distribution platforms like Hugging Face and ClawHub to spread malware by uploading trojanized files (files containing hidden malicious code) that trick users into downloading them through social engineering. The attackers use indirect prompt injection (embedding hidden instructions in data that AI systems read and execute without the user knowing) to make AI agents automatically download and run malware on users' computers, with hundreds of malicious files identified across both platforms.

‘Trivial’ exploit can give attackers root access to Linux kernel

infonews
security
Apr 30, 2026

A serious vulnerability called Copy Fail (CVE-2026-31431) in the Linux kernel allows unprivileged users to gain root access (the highest permission level) through a simple exploit, affecting virtually all Linux systems since 2017. With root access, attackers can steal or delete data. Until Linux distributions release patches, the main defense is monitoring for unauthorized privilege escalation attempts.

CVE-2026-31431: Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability

infovulnerability
security
Apr 30, 2026
CVE-2026-31431🔥 Actively Exploited

Bank regulator sounds warning over cybersecurity threat posed by AI models

infonews
securitypolicy

Our evaluation of OpenAI's GPT-5.5 cyber capabilities

infonews
research
Apr 30, 2026

N/A -- The provided content is a metadata header and navigation element from a web page, not an actual article or analysis. It contains only a title, date, author attribution, topic tags, and sponsorship information with no substantive technical content about GPT-5.5, cyber capabilities, or any security findings to summarize.

CVE-2026-6543: IBM Langflow Desktop 1.0.0 through 1.8.4 Langflow allows an attacker to execute arbitrary commands with the privileges o

highvulnerability
security
Apr 30, 2026
CVE-2026-6543

IBM Langflow Desktop versions 1.0.0 through 1.8.4 contains a code injection vulnerability (CWE-94, a flaw where attackers can insert and execute their own code) that allows attackers to run arbitrary commands (any commands an attacker chooses) with the same permissions as the Langflow application. This could let attackers steal sensitive information like API keys and database passwords, modify files, or attack other systems on the network.

CVE-2026-6542: IBM Langflow OSS 1.0.0 through 1.8.4 could allow any user to supply a flow_id to read transaction logs and vertex build

mediumvulnerability
security
Apr 30, 2026
CVE-2026-6542

IBM Langflow OSS (open-source software) versions 1.0.0 through 1.8.4 has a vulnerability where any user can view and delete other users' data by supplying a flow_id (a reference number for a workflow). This happens because the system doesn't properly check who should be allowed to access certain information, allowing unauthorized access to transaction logs and build data.

CVE-2026-40687: In Exim before 4.99.2, when the SPA authentication driver is used with an adversarial SPA resource, there can be an out-

mediumvulnerability
security
Apr 30, 2026
CVE-2026-40687

CVE-2026-40687 is a vulnerability in Exim email software (before version 4.99.2) where the SPA authentication driver (a method for verifying user identity) can be exploited with a malicious SPA resource to cause an out-of-bounds write (writing data to memory locations outside the intended area), which crashes the email connection or exposes uninitialized heap memory data (unused memory that may contain sensitive information).

CVE-2026-3345: IBM Langflow Desktop <=1.8.4 Langflow could allow a remote attacker to traverse directories on the system. An attacker c

mediumvulnerability
security
Apr 30, 2026
CVE-2026-3345

IBM Langflow Desktop version 1.8.4 and earlier has a path traversal vulnerability (CWE-22, a flaw that lets attackers access files outside intended directories) that allows remote attackers to view arbitrary files on a system by sending specially crafted URLs containing "dot dot" sequences (/../), which trick the system into navigating to restricted folders.

CVE-2026-4503: IBM Langflow Desktop 1.0.0 through 1.8.4 Langflow could allow an unauthenticated user to view other users' images due to

highvulnerability
security
Apr 30, 2026
CVE-2026-4503

IBM Langflow Desktop versions 1.0.0 through 1.8.4 have a security flaw where an unauthenticated user (someone without a login) can view other users' images by manipulating a user-controlled key (a piece of data that identifies which resource to access). This happens because the application doesn't properly check permissions when accessing images, which is a type of vulnerability called authorization bypass through user-controlled key (CWE-639).

CVE-2026-4502: IBM Langflow Desktop 1.2.0 through 1.8.4 Langflow could allow an authenticated attacker to traverse directories on the s

mediumvulnerability
security
Apr 30, 2026
CVE-2026-4502

IBM Langflow Desktop versions 1.2.0 through 1.8.4 has a path traversal vulnerability (CVE-2026-4502) that allows an authenticated attacker to write arbitrary files on a system by sending specially crafted URL requests with "dot dot" sequences (/../, which move up directory levels). This affects users who are already logged into the application.

CVE-2026-3346: IBM Langflow Desktop 1.6.0 through 1.8.4 Lanflow is vulnerable to stored cross-site scripting. This vulnerability allows

mediumvulnerability
security
Apr 30, 2026
CVE-2026-3346

IBM Langflow Desktop versions 1.6.0 through 1.8.4 has a stored cross-site scripting vulnerability (XSS, a flaw where an attacker can inject malicious code that gets saved and executed in a web interface). An authenticated user can embed JavaScript code in the Web UI, which could alter how the application works and potentially expose user credentials to attackers who access the same session.

CVE-2026-3340: IBM Langflow Desktop 1.0.0 through 1.8.4 IBM Langflow is vulnerable to server-side request forgery (SSRF). This may allo

mediumvulnerability
security
Apr 30, 2026
CVE-2026-3340

IBM Langflow Desktop versions 1.0.0 through 1.8.4 have a vulnerability called SSRF (server-side request forgery, where an attacker tricks the server into making requests it shouldn't). An authenticated attacker (someone with login access) could exploit this to send unauthorized requests from the system, potentially discovering network information or launching additional attacks.

Judge cuts off Musk’s AI doomsday talk as his testimony ends in OpenAI case

infonews
industry
Apr 30, 2026

Elon Musk testified in his lawsuit against Sam Altman and OpenAI, with a judge interrupting his discussion about AI risks during cross-examination. The trial is revealing private communications about OpenAI's creation and will include testimony from other tech industry leaders about the conflict between Musk and Altman.

After dissing Anthropic for limiting Mythos, OpenAI restricts access to Cyber, too

infonews
securitypolicy

Anthropic's Mythos Has Landed: Here's What Comes Next for Cyber

infonews
securityindustry

New Bluekit phishing service includes an AI assistant, 40 templates

mediumnews
security
Apr 30, 2026

Bluekit is a phishing kit (a pre-built toolkit that helps attackers create fake login pages to steal credentials) that includes over 40 templates targeting popular services like Gmail, iCloud, and GitHub, plus an AI assistant panel supporting models like GPT-4.1 and Claude to help cybercriminals draft phishing emails. The kit integrates domain registration, phishing page setup, campaign management, and real-time victim monitoring into one interface, making it accessible to less-skilled attackers. While the AI-generated outputs are currently basic and require manual cleanup, the platform is under active development and receiving frequent updates, suggesting it will likely become more widely adopted.

Previous7 / 224Next
CSO Online
CSO Online
SecurityWeek

Fix: Apply kernel patches from your Linux distribution as soon as they are released, and reboot systems after patching. According to the source, 'As soon as patches are available for what's been dubbed the Copy Fail logic bug... As of midday Thursday, only Arch Linux had released a patch,' but other distributions are expected to release patches within days. For Debian, Ubuntu, and Debian-based systems, the exploitable code can be disabled via kernel commands before patches are available, though this option is not feasible in large environments according to the source.

CSO Online

The Linux Kernel has a vulnerability where system resources are incorrectly transferred between different security zones, potentially allowing an attacker to gain elevated privileges (privilege escalation, meaning they can perform actions normally restricted to administrators). This vulnerability is currently being exploited by attackers in the wild.

Fix: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CISA Known Exploited Vulnerabilities
Apr 30, 2026

Australia's financial regulator (APRA) warns that advanced AI models like Claude Mythos could give attackers powerful tools to find security flaws faster than banks can fix them, threatening the banking sector. The regulator found that banks treat AI as just another technology and lack proper processes to identify and patch vulnerabilities quickly enough to keep up with AI-assisted attacks. APRA calls for urgent overhauls to governance, vulnerability testing, and security assessment of AI platforms.

Fix: APRA identifies the following areas for improvement: (1) urgent need to more rapidly identify and remediate vulnerabilities through major process overhaul, (2) robust security testing across AI-generated code, software components, and libraries, and (3) deeper assessment of major AI platforms and services. The source also notes that regulators are requesting access to Claude Mythos itself so financial institutions can use it to defend against the cyberattacks it could enable.

CSO Online
Simon Willison's Weblog
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
The Guardian Technology
Apr 30, 2026

OpenAI is restricting access to its new cybersecurity tool called Cyber (part of GPT-5.5) to only approved users, requiring them to submit credentials and explain their intended use through an application on OpenAI's website. Cyber can perform tasks like penetration testing (simulating attacks to find security weaknesses), vulnerability identification, and malware reverse engineering (analyzing malicious code to understand how it works), but OpenAI is limiting access because the tool could be misused by attackers if widely available.

Fix: OpenAI says it's working to make Cyber more widely available by consulting with the U.S. government and identifying more users with legitimate cybersecurity credentials.

TechCrunch (Security)
Apr 30, 2026

Anthropic has released a new AI model called Mythos that industry leaders believe could significantly disrupt cybersecurity practices and defenses. The article discusses potential threats this model poses and reports on what cybersecurity experts are saying about its implications.

Dark Reading
BleepingComputer