Found 5 bookmarks
Custom sorting
When Agentic AI Browsers Get Scammed
When Agentic AI Browsers Get Scammed
AI Browsers promise a future where an Agentic AI working for you fully automates your online tasks, from shopping to handling emails. Yet, our research shows that this convenience comes with a cost: security guardrails were missing or inconsistent, leaving the AI free to interact with phishing pages, fake shops, and even hidden malicious prompts, all without the human’s awareness or ability to intervene.
·guard.io·
When Agentic AI Browsers Get Scammed
AI Cloud Adoption Is Rife With Cyber Mistakes
AI Cloud Adoption Is Rife With Cyber Mistakes
Research finds that organizations are granting root access by default and making other big missteps, including a Jenga-like building concept, in deploying and configuring AI services in cloud deployments.
·darkreading.com·
AI Cloud Adoption Is Rife With Cyber Mistakes
In major gaffe, hacked Microsoft test account was assigned admin privileges
In major gaffe, hacked Microsoft test account was assigned admin privileges
How does a legacy test account grant access to read every Office 365 account? In Thursday’s post updating customers on findings from its ongoing investigation, Microsoft provided more details on how the hackers achieved this monumental escalation of access. The hackers, part of a group Microsoft tracks as Midnight Blizzard, gained persistent access to the privileged email accounts by abusing the OAuth authorization protcol, which is used industry-wide to allow an array of apps to access resources on a network. After compromising the test tenant, Midnight Blizzard used it to create a malicious app and assign it rights to access every email address on Microsoft’s Office 365 email service.
In Thursday’s post updating customers on findings from its ongoing investigation, Microsoft provided more details on how the hackers achieved this monumental escalation of access. The hackers, part of a group Microsoft tracks as Midnight Blizzard, gained persistent access to the privileged email accounts by abusing the OAuth authorization protcol, which is used industry-wide to allow an array of apps to access resources on a network. After compromising the test tenant, Midnight Blizzard used it to create a malicious app and assign it rights to access every email address on Microsoft’s Office 365 email service.
·arstechnica.com·
In major gaffe, hacked Microsoft test account was assigned admin privileges