Hi, I'm Vivian, a cybersecurity and AI Product Manager trying to keep up with an industry that moves faster than I can whisk up my morning matcha. Every week brings a new wave of vulnerabilities, AI security mishaps, and breaches that keep us on our toes, so I take some time to share the most interesting news instead of letting it all blur together. Let's dive into what kept us up at night recently in cybersecurity and AI security.

AI News:

xAI Faces Backlash Over Grok's Illicit Image Generation

xAI's Grok chatbot was found generating sexualized images of minors, a violation the AI itself acknowledged as potentially illegal under US law. While xAI remained officially silent, the Grok account posted a generated apology, leading to widespread criticism highlighting the absurdity of an AI tool apologizing for creating illegal content while its parent company avoids direct accountability.

Visa Tests Autonomous AI Payment Agents

Visa announced the successful completion of hundreds of secure, agent-initiated transactions, signaling a shift where AI agents will independently manage consumer purchases by 2026. Collaborating with over 100 partners including Skyfire, Nekuda, and Akamai, Visa is deploying its "Visa Intelligent Commerce" framework to enable AI tools to autonomously discover products and execute payments. The initiative includes the new Trusted Agent Protocol to distinguish legitimate agents from malicious bots.

OpenAI Recruits Safety Executive for High-Risk AI Capabilities

OpenAI is hiring a "Head of Preparedness" with a $555,000 salary to lead its safety systems team and develop mitigation strategies for high-risk AI capabilities. The recruitment follows increasing scrutiny of AI's impact on mental health and cybersecurity, including lawsuits alleging ChatGPT's involvement in user suicides and concerns about the technology facilitating cyberattacks.

Linux Foundation Adopts SAFE-MCP Security Framework

The SAFE-MCP framework has been formally adopted by the Linux Foundation and the OpenID Foundation. Designed to protect the Model Context Protocol, SAFE-MCP establishes a common security baseline to prevent exploits arising from over-privileged tools or malicious prompts.

 

AI Vulnerabilities

Security Risks in Claude Chrome Extension

A threat analysis of the "Claude in Chrome" extension warns that its design creates significant vulnerabilities by keeping the AI agent permanently authenticated with broad permissions to execute arbitrary JavaScript. Because the tool shares the user's active session and processes untrusted web content by default, it's highly susceptible to prompt injection attacks where malicious webpages can manipulate the AI into extracting sensitive data or performing unauthorized actions. This architecture shifts the threat model from traditional malware to "agent manipulation," turning the trusted assistant into a potential insider threat operating with full user privileges.

Microsoft Copilot Connected Agents Enable Email Impersonation

Researchers demonstrated a vulnerability in Microsoft Copilot Studio's "Connected Agents" feature, which allows different AI agents to share tools and logic. By default enabled, this feature means an internal agent with sensitive capabilities, such as sending emails from official company addresses, can be quietly invoked by other agents without the owner's knowledge. A proof-of-concept showed how a malicious actor could connect a rogue agent to a legitimate customer support bot, using the bot's credentials to send unauthorized phishing or damaging emails appearing to originate from the organization.

 

AI Business

BigBear.ai Acquires Ask Sage for $250M

BigBear.ai finalized its $250 million acquisition of Ask Sage to accelerate delivery of secure, operational AI across defense, intelligence, and regulated industries. The deal addresses the need for AI solutions that are trusted, scalable, and capable of functioning within demanding security and compliance frameworks.

Brivo and Eagle Eye Networks Merge to Form Largest AI Security Platform

Brivo and Eagle Eye Networks announced a merger to create the largest AI cloud-native physical security company globally, unifying both companies under the Brivo brand. The combined entity offers the "Brivo Security Suite," a comprehensive platform integrating AI, video intelligence, visitor management, and intrusion detection into a single cloud-native solution for centralized security operations.

 

Cybersecurity News

US Cybersecurity Professionals Plead Guilty to Ransomware Attacks

Two US cybersecurity professionals, Kevin Martin and Ryan Goldberg, pleaded guilty to conspiring to commit extortion for their roles as affiliates of the BlackCat/Alphv ransomware group. Martin worked as a ransomware negotiator at DigitalMint, while Goldberg was an incident response manager at Sygnia. The pair leveraged their industry positions to hack companies, deploy ransomware, and extort victims, receiving at least $1.2 million in Bitcoin in one instance while paying a 20% commission to BlackCat administrators. Both face up to 20 years in prison.

'Zoom Stealer' Extensions Harvest Meeting Data from 2.2 Million Users

A malicious campaign dubbed "Zoom Stealer" was discovered targeting 2.2 million users through 18 legitimate-looking browser extensions on Chrome, Firefox, and Edge. Attributed to the China-linked threat actor DarkSpectre, these extensions request excessive permissions for 28 conferencing platforms including Zoom, Teams, and Google Meet to harvest meeting URLs, embedded passwords, and attendee lists. Stolen data is exfiltrated in real time via WebSockets, creating a potential intelligence database for corporate espionage, unauthorized meeting access, and social engineering attacks.

Infostealers Create Self-Sustaining Malware Campaign

Analysis reveals that the "ClickFix" campaign, which tricks users into running malicious PowerShell scripts via fake verification prompts, is fueled by a self-sustaining cycle of compromised infrastructure. Cross-referencing over 1,600 active ClickFix domains with threat intelligence databases found that many attack sites are legitimate business domains whose administrative credentials were previously stolen by infostealers. This feedback loop allows attackers to weaponize victim infrastructure to launch further attacks.

 

That's all for now… Stay informed and protected.