Technology

Related News

The 'affair mode' phone settings that all cheaters use: I knew my partner was up to something... here's how I cracked his secret code and uncovered all his dirty antics

  • Kim Komando
  • Published date: 2026-04-25 17:15:35

Cheaters are increasingly using an array of sneaky tech tricks to hide their tracks. Here's how to spot the hidden clues and uncover all their secrets...

Cheaters are becoming more technologically savvy than ever, turning to hidden phone settings, disappearing messages and location tricks to conceal their tracks. Experts warn that modern smartphones … [+10948 chars]

How Transnational Repression Tests European Democracies

  • Hossein Amjadi
  • Published date: 2026-04-25 11:53:37

The contemporary rise of transnational repression has exposed a structural paradox in liberal democracies. Authoritarian regimes increasingly exert coercive influence within democratic countries, even though they lack formal political authority there. Protect…

The contemporary rise of transnational repression has exposed a structural paradox in liberal democracies. Authoritarian regimes increasingly exert coercive influence within democratic countries, eve… [+4767 chars]

Best of the Worst: Five Attacks That Looked Broken (and Worked)Best of the Worst: Five Attacks That Looked Broken (and Worked)

  • None
  • Published date: 2026-04-25 00:00:00

None

<p>The post <a href="https://ironscales.com/blog/best-of-the-worst-april-25-2026">Best of the Worst: Five Attacks That Looked Broken (and Worked)</a> appeared first on <a href="https://ironscales.com/blog">Blog</a>.</p><h3>I skipped last week’s roundup. Holiday weekend, family stuff, the usual. So this is a <span style="font-style: italic;">two-week-ish</span> view of what we’ve published in the <a href="https://ironscales.com/threat-intelligence?filter=">Threat Intelligence</a> series since Edition 03 dropped on April 13.</h3><p>Quick context for new readers. Every week, I pull a handful of real phishing attacks we caught, sit with them for a bit, and try to find the thread connecting them. Last edition was about precision: surgical attacks built for a specific recipient before the send. The kind of attack that took reconnaissance and patience.</p><p>This edition is the opposite story.</p><p>The five attacks below were sloppy work.</p><p>Several had quality-control failures the attackers themselves should have caught before launch. One had two letters transposed inside the word Missouri. One had Mustache template variables sitting in the email body as raw text. One pasted “adobe.com” into a directory path of an obviously malicious domain.</p><p>They all reached inboxes anyway.</p><p>This is the part of the threat picture that doesn’t make conference keynotes. Plenty of inbox-resident phishing this month came from operators running cheap, fast, broken kits. They do not care if the kit is broken (because the gateway will deliver it for them).</p><h2>5 Attacks. One Embarrassing Floor.</h2><p>In <a href="https://ironscales.com/threat-intelligence/exposed-phishing-kit-template-variables-mailbox-full-urgency">When the Phishing Kit Ships Early: Exposed Template Variables Reveal Attack Infrastructure</a>, the operator forgot to populate the kit. The email body referenced a <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">CPL_Agreement_ #</code>, the kind of Mustache or Jinja2 syntax a templating engine is supposed to fill in before send. The single embedded link in the message pointed to <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">hxxp://vm/</code>, <span style="background-color: transparent;">a phishing kit’s local development placeholder, exposed to the inbox because someone hit deploy without a final QA pass. The compromised sending account’s authentication carried it in. The subject line read “[Action required] Your_Mail_Box_Is_Full,” underscores and all. Microsoft delivered it.</span></p><p>In <a href="https://ironscales.com/threat-intelligence/typosquat-reply-to-invoice-payment-diversion-missouri">One Missing Letter, One Stolen Payment: A Reply-To Typosquat That Beat the Spam Score</a>, the attacker registered <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">leadsavingsofmissuori.com</code> as a typosquat of the real vendor domain. The “o” and “u” inside Missouri are transposed (Missuori instead of Missouri). One character pair, swapped, the entire technical investment required to intercept a payment conversation. Microsoft’s Spam Confidence Level rated the message SCL=8 (high spam confidence), and one of the embedded links was internally flagged as malicious. <span style="font-weight: bold;">The message landed in the inbox anyway because the recipient’s organization had a transport rule whitelisting payment-related senders. </span>The whitelist override beat the explicit malicious-URL signal coming from the same Microsoft stack that was scoring it.</p><p>In <a href="https://ironscales.com/threat-intelligence/url-path-deception-adobe-brand-embedded-attacker-domain">The URL That Put adobe.com in the Wrong Place</a>, the attacker pasted <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">adobe.com</code> into the directory path of a fishy domain (<code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">reviewdocpdfreader[.]com/docprivatepremiumfile/allfile/adobe.com/</code>). It is the URL-deception equivalent of putting a “Police” sticker on the side of a non-police vehicle. This is not a new trick. It still got past the perimeter, because the URL parser saw a legitimate substring and apparently called it close enough.</p><p>In <a href="https://ironscales.com/threat-intelligence/adobe-sign-esignature-redirect-chain-fameklinik-credential-harvest">Sign Here, Get Phished: Inside an Adobe Sign Lure With a Multi-Hop Redirect to Credential Theft</a>, the kit operators could not even keep the brand voice consistent inside their own email. The CTA buttons alternated between “Adobe” and “AdobeSign” depending on the paragraph. That is the visible seam from a template stitched together out of two earlier kits without anyone proofreading the result. Themis caught the redirect chain on first-time-sender behavioral signals. The point is that the kit was visibly cobbled, and three commercial gateways still cleared it.</p><p>What these four share is a lack of QA.</p><p>…and the kits were sloppy before they shipped.</p><p>…and the gateways shipped them forward anyway.</p><h2>Featured Attack: The Hungarian Bank From Nepal</h2><p>A K&amp;H Bank phishing email arrived in inboxes from a Nepali domain. K&amp;H Bank is real, headquartered in Budapest, the second-largest commercial bank in Hungary. The sending domain was <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">rstonline[.]com[.]np</code>. No relationship to Hungary, no relationship to banking, no credible resemblance to any K&amp;H property.</p><p>Read the <a href="https://ironscales.com/threat-intelligence/international-bank-impersonation-nepal-domain-hungarian-mojibake">full incident breakdown here</a>.</p><p>The kit hotlinked the real <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">kh.hu</code> favicon, which is the only thing in the message that actually looked Hungarian. The body text was supposed to be in Hungarian. It was not, exactly. The phrase “Fontos információ” (Hungarian for “important information”) rendered as “Fontos informaciA3” because the kit was authored on a system that handled the character encoding wrong, and the fix never happened. Any actual Hungarian speaker reading this email would notice immediately. Most non-Hungarian readers would also notice that the text looks wrong, because mojibake reads as garbage in any language.</p><p>The terminal link did not point to a K&amp;H lookalike or to anything resembling a banking domain. It pointed to <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">ecstechs[.]net</code>, an unrelated business hosting domain. The chain inside the message did not even attempt to maintain the impersonation consistently from header to body to call-to-action.</p><blockquote style="border-left: 8px solid #00336d; padding: 0.5em 1em; background: linear-gradient(to right, #e6f2ff 0%, #ffffff 100%); margin: 1.5em 0;"> <p style="font-size: 1.1em; color: #222; margin: 0;">I have to sit with this one for a minute. The kit author is in one country. The sending infrastructure is in a second country. The bank being impersonated is in a third country. The character-encoding library used to build the body is wrong for the target language. The CTA points to a domain that has no relationship to the brand being impersonated. Five separate quality failures, layered, in a single message. And it cleared authentication well enough to land in inboxes. The attacker did not need to do better, because the gateway was not asking for better.</p> </blockquote><p>DKIM was valid against the attacker’s own configured selector. SPF returned no policy at all. Microsoft’s compauth scoring still let the message through, because compauth weighting in Exchange Online treats “no SPF policy published” as inconclusive rather than failed. <a href="https://ironscales.com/platform">Our Adaptive AI</a> flagged the message on cross-language anomalies and a sender domain history that had nothing in common with the impersonated brand. Three commercial gateways did not.</p><p>If the attacker had spent another twenty minutes proofreading their own kit, they could have shipped a much more convincing attack. They did not need to. The bar to clear was a triple-acronym authentication check that was already half-passing on the strength of a DKIM signature the attacker generated themselves.</p><p><em>See Your Risk: <a href="https://secure.ironscales.com/email-security-gateway-missed-attacks-calculator">Find out how many threats like this your current security stack is missing</a></em></p><h2>What Defenders Should Take From This Week</h2><p>A few concrete takeaways:</p><ol> <li><strong>Audit your transport rules.</strong> The Missouri typosquat case landed because an organization-level allow-rule overrode a high-spam-confidence verdict that the platform itself had flagged. If you have payment-related allow-rules in Exchange or Google Workspace, those rules are an attack surface. Document them, audit them quarterly, and pair them with secondary detection (behavioral or deep-content) instead of treating “allow” as terminal.</li> <li><strong>Look for kit tells in the body.</strong> Unresolved template variables (<code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;"></code>, <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">${...}</code>, <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">&lt;%...%&gt;</code>), placeholder URLs (<code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">hxxp://</code>, <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">localhost</code>, <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">127.0.0.1</code>, <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">vm/</code>), brand inconsistencies inside a single message, and character-encoding errors are all visible to a content scanner that bothers to look. They are also visible to a trained user.</li> <li><strong>Stop trusting URL substrings.</strong> A URL with <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">adobe.com</code> in the path is not an Adobe URL. Any URL parser that grants reputation based on substring presence rather than registered hostname is broken. Verify the eTLD+1.</li> <li><strong>DKIM-pass is not endorsement.</strong> The K&amp;H Bank case had a valid DKIM signature against a selector the attacker configured. DKIM verifies that the signing key controls the message. It does not verify that the signing key belongs to the impersonated brand. Pair DKIM checks with brand-impersonation detection.</li> <li><strong>Budget your assumption of attacker effort.</strong> A meaningful share of inbox-resident phishing this month did not require sophistication, recon, or operator skill. The market floor for “attack good enough to deliver” is low. Build detection assuming a sloppy adversary delivering volume, alongside the tooling you have for the surgical operator from last week’s roundup.</li> </ol><h3>See You Next Friday</h3><p>Attack of the Day publishes daily in the <a href="https://ironscales.com/threat-intelligence?filter=">Threat Intelligence</a> section. Next week: probably another roundup, on time this time, with whatever pattern emerges from the next seven posts. If the pattern is “the floor went lower again,” I will say so.</p><p><img decoding="async" src="https://track.hubspot.com/__ptq.gif?a=20641927&amp;k=14&amp;r=https%3A%2F%2Fironscales.com%2Fblog%2Fbest-of-the-worst-april-25-2026&amp;bu=https%253A%252F%252Fironscales.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/best-of-the-worst-five-attacks-that-looked-broken-and-worked/" data-a2a-title="Best of the Worst: Five Attacks That Looked Broken (and Worked)"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbest-of-the-worst-five-attacks-that-looked-broken-and-worked%2F&amp;linkname=Best%20of%20the%20Worst%3A%20Five%20Attacks%20That%20Looked%20Broken%20%28and%20Worked%29" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbest-of-the-worst-five-attacks-that-looked-broken-and-worked%2F&amp;linkname=Best%20of%20the%20Worst%3A%20Five%20Attacks%20That%20Looked%20Broken%20%28and%20Worked%29" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbest-of-the-worst-five-attacks-that-looked-broken-and-worked%2F&amp;linkname=Best%20of%20the%20Worst%3A%20Five%20Attacks%20That%20Looked%20Broken%20%28and%20Worked%29" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbest-of-the-worst-five-attacks-that-looked-broken-and-worked%2F&amp;linkname=Best%20of%20the%20Worst%3A%20Five%20Attacks%20That%20Looked%20Broken%20%28and%20Worked%29" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbest-of-the-worst-five-attacks-that-looked-broken-and-worked%2F&amp;linkname=Best%20of%20the%20Worst%3A%20Five%20Attacks%20That%20Looked%20Broken%20%28and%20Worked%29" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://ironscales.com/blog">Blog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Audian Paxson">Audian Paxson</a>. Read the original post at: <a href="https://ironscales.com/blog/best-of-the-worst-april-25-2026">https://ironscales.com/blog/best-of-the-worst-april-25-2026</a> </p><p>The post <a href="https://ironscales.com/blog/best-of-the-worst-april-25-2026">Best of the Worst: Five Attacks That Looked Broken (and Worked)</a> appeared first on <a href="https://ironscales.com/blog">Blog</a>.</p><h3>I skipped last week’s roundup. Holiday weekend, family stuff, the usual. So this is a <span style="font-style: italic;">two-week-ish</span> view of what we’ve published in the <a href="https://ironscales.com/threat-intelligence?filter=">Threat Intelligence</a> series since Edition 03 dropped on April 13.</h3><p>Quick context for new readers. Every week, I pull a handful of real phishing attacks we caught, sit with them for a bit, and try to find the thread connecting them. Last edition was about precision: surgical attacks built for a specific recipient before the send. The kind of attack that took reconnaissance and patience.</p><p>This edition is the opposite story.</p><p>The five attacks below were sloppy work.</p><p>Several had quality-control failures the attackers themselves should have caught before launch. One had two letters transposed inside the word Missouri. One had Mustache template variables sitting in the email body as raw text. One pasted “adobe.com” into a directory path of an obviously malicious domain.</p><p>They all reached inboxes anyway.</p><p>This is the part of the threat picture that doesn’t make conference keynotes. Plenty of inbox-resident phishing this month came from operators running cheap, fast, broken kits. They do not care if the kit is broken (because the gateway will deliver it for them).</p><h2>5 Attacks. One Embarrassing Floor.</h2><p>In <a href="https://ironscales.com/threat-intelligence/exposed-phishing-kit-template-variables-mailbox-full-urgency">When the Phishing Kit Ships Early: Exposed Template Variables Reveal Attack Infrastructure</a>, the operator forgot to populate the kit. The email body referenced a <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">CPL_Agreement_ #</code>, the kind of Mustache or Jinja2 syntax a templating engine is supposed to fill in before send. The single embedded link in the message pointed to <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">hxxp://vm/</code>, <span style="background-color: transparent;">a phishing kit’s local development placeholder, exposed to the inbox because someone hit deploy without a final QA pass. The compromised sending account’s authentication carried it in. The subject line read “[Action required] Your_Mail_Box_Is_Full,” underscores and all. Microsoft delivered it.</span></p><p>In <a href="https://ironscales.com/threat-intelligence/typosquat-reply-to-invoice-payment-diversion-missouri">One Missing Letter, One Stolen Payment: A Reply-To Typosquat That Beat the Spam Score</a>, the attacker registered <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">leadsavingsofmissuori.com</code> as a typosquat of the real vendor domain. The “o” and “u” inside Missouri are transposed (Missuori instead of Missouri). One character pair, swapped, the entire technical investment required to intercept a payment conversation. Microsoft’s Spam Confidence Level rated the message SCL=8 (high spam confidence), and one of the embedded links was internally flagged as malicious. <span style="font-weight: bold;">The message landed in the inbox anyway because the recipient’s organization had a transport rule whitelisting payment-related senders. </span>The whitelist override beat the explicit malicious-URL signal coming from the same Microsoft stack that was scoring it.</p><p>In <a href="https://ironscales.com/threat-intelligence/url-path-deception-adobe-brand-embedded-attacker-domain">The URL That Put adobe.com in the Wrong Place</a>, the attacker pasted <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">adobe.com</code> into the directory path of a fishy domain (<code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">reviewdocpdfreader[.]com/docprivatepremiumfile/allfile/adobe.com/</code>). It is the URL-deception equivalent of putting a “Police” sticker on the side of a non-police vehicle. This is not a new trick. It still got past the perimeter, because the URL parser saw a legitimate substring and apparently called it close enough.</p><p>In <a href="https://ironscales.com/threat-intelligence/adobe-sign-esignature-redirect-chain-fameklinik-credential-harvest">Sign Here, Get Phished: Inside an Adobe Sign Lure With a Multi-Hop Redirect to Credential Theft</a>, the kit operators could not even keep the brand voice consistent inside their own email. The CTA buttons alternated between “Adobe” and “AdobeSign” depending on the paragraph. That is the visible seam from a template stitched together out of two earlier kits without anyone proofreading the result. Themis caught the redirect chain on first-time-sender behavioral signals. The point is that the kit was visibly cobbled, and three commercial gateways still cleared it.</p><p>What these four share is a lack of QA.</p><p>…and the kits were sloppy before they shipped.</p><p>…and the gateways shipped them forward anyway.</p><h2>Featured Attack: The Hungarian Bank From Nepal</h2><p>A K&amp;H Bank phishing email arrived in inboxes from a Nepali domain. K&amp;H Bank is real, headquartered in Budapest, the second-largest commercial bank in Hungary. The sending domain was <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">rstonline[.]com[.]np</code>. No relationship to Hungary, no relationship to banking, no credible resemblance to any K&amp;H property.</p><p>Read the <a href="https://ironscales.com/threat-intelligence/international-bank-impersonation-nepal-domain-hungarian-mojibake">full incident breakdown here</a>.</p><p>The kit hotlinked the real <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">kh.hu</code> favicon, which is the only thing in the message that actually looked Hungarian. The body text was supposed to be in Hungarian. It was not, exactly. The phrase “Fontos információ” (Hungarian for “important information”) rendered as “Fontos informaciA3” because the kit was authored on a system that handled the character encoding wrong, and the fix never happened. Any actual Hungarian speaker reading this email would notice immediately. Most non-Hungarian readers would also notice that the text looks wrong, because mojibake reads as garbage in any language.</p><p>The terminal link did not point to a K&amp;H lookalike or to anything resembling a banking domain. It pointed to <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">ecstechs[.]net</code>, an unrelated business hosting domain. The chain inside the message did not even attempt to maintain the impersonation consistently from header to body to call-to-action.</p><blockquote style="border-left: 8px solid #00336d; padding: 0.5em 1em; background: linear-gradient(to right, #e6f2ff 0%, #ffffff 100%); margin: 1.5em 0;"> <p style="font-size: 1.1em; color: #222; margin: 0;">I have to sit with this one for a minute. The kit author is in one country. The sending infrastructure is in a second country. The bank being impersonated is in a third country. The character-encoding library used to build the body is wrong for the target language. The CTA points to a domain that has no relationship to the brand being impersonated. Five separate quality failures, layered, in a single message. And it cleared authentication well enough to land in inboxes. The attacker did not need to do better, because the gateway was not asking for better.</p> </blockquote><p>DKIM was valid against the attacker’s own configured selector. SPF returned no policy at all. Microsoft’s compauth scoring still let the message through, because compauth weighting in Exchange Online treats “no SPF policy published” as inconclusive rather than failed. <a href="https://ironscales.com/platform">Our Adaptive AI</a> flagged the message on cross-language anomalies and a sender domain history that had nothing in common with the impersonated brand. Three commercial gateways did not.</p><p>If the attacker had spent another twenty minutes proofreading their own kit, they could have shipped a much more convincing attack. They did not need to. The bar to clear was a triple-acronym authentication check that was already half-passing on the strength of a DKIM signature the attacker generated themselves.</p><p><em>See Your Risk: <a href="https://secure.ironscales.com/email-security-gateway-missed-attacks-calculator">Find out how many threats like this your current security stack is missing</a></em></p><h2>What Defenders Should Take From This Week</h2><p>A few concrete takeaways:</p><ol> <li><strong>Audit your transport rules.</strong> The Missouri typosquat case landed because an organization-level allow-rule overrode a high-spam-confidence verdict that the platform itself had flagged. If you have payment-related allow-rules in Exchange or Google Workspace, those rules are an attack surface. Document them, audit them quarterly, and pair them with secondary detection (behavioral or deep-content) instead of treating “allow” as terminal.</li> <li><strong>Look for kit tells in the body.</strong> Unresolved template variables (<code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;"></code>, <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">${...}</code>, <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">&lt;%...%&gt;</code>), placeholder URLs (<code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">hxxp://</code>, <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">localhost</code>, <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">127.0.0.1</code>, <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">vm/</code>), brand inconsistencies inside a single message, and character-encoding errors are all visible to a content scanner that bothers to look. They are also visible to a trained user.</li> <li><strong>Stop trusting URL substrings.</strong> A URL with <code style="background-color: #f9f9f9; padding: 0.2em 0.6em; border: 1px solid #e0e0e0; border-radius: 6px; font-family: monospace; font-size: 0.95em; color: #333333;">adobe.com</code> in the path is not an Adobe URL. Any URL parser that grants reputation based on substring presence rather than registered hostname is broken. Verify the eTLD+1.</li> <li><strong>DKIM-pass is not endorsement.</strong> The K&amp;H Bank case had a valid DKIM signature against a selector the attacker configured. DKIM verifies that the signing key controls the message. It does not verify that the signing key belongs to the impersonated brand. Pair DKIM checks with brand-impersonation detection.</li> <li><strong>Budget your assumption of attacker effort.</strong> A meaningful share of inbox-resident phishing this month did not require sophistication, recon, or operator skill. The market floor for “attack good enough to deliver” is low. Build detection assuming a sloppy adversary delivering volume, alongside the tooling you have for the surgical operator from last week’s roundup.</li> </ol><h3>See You Next Friday</h3><p>Attack of the Day publishes daily in the <a href="https://ironscales.com/threat-intelligence?filter=">Threat Intelligence</a> section. Next week: probably another roundup, on time this time, with whatever pattern emerges from the next seven posts. If the pattern is “the floor went lower again,” I will say so.</p><p><img loading="lazy" decoding="async" src="https://track.hubspot.com/__ptq.gif?a=20641927&amp;k=14&amp;r=https%3A%2F%2Fironscales.com%2Fblog%2Fbest-of-the-worst-april-25-2026&amp;bu=https%253A%252F%252Fironscales.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/best-of-the-worst-five-attacks-that-looked-broken-and-worked/" data-a2a-title="Best of the Worst: Five Attacks That Looked Broken (and Worked)"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbest-of-the-worst-five-attacks-that-looked-broken-and-worked%2F&amp;linkname=Best%20of%20the%20Worst%3A%20Five%20Attacks%20That%20Looked%20Broken%20%28and%20Worked%29" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbest-of-the-worst-five-attacks-that-looked-broken-and-worked%2F&amp;linkname=Best%20of%20the%20Worst%3A%20Five%20Attacks%20That%20Looked%20Broken%20%28and%20Worked%29" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbest-of-the-worst-five-attacks-that-looked-broken-and-worked%2F&amp;linkname=Best%20of%20the%20Worst%3A%20Five%20Attacks%20That%20Looked%20Broken%20%28and%20Worked%29" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbest-of-the-worst-five-attacks-that-looked-broken-and-worked%2F&amp;linkname=Best%20of%20the%20Worst%3A%20Five%20Attacks%20That%20Looked%20Broken%20%28and%20Worked%29" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbest-of-the-worst-five-attacks-that-looked-broken-and-worked%2F&amp;linkname=Best%20of%20the%20Worst%3A%20Five%20Attacks%20That%20Looked%20Broken%20%28and%20Worked%29" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://ironscales.com/blog">Blog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Audian Paxson">Audian Paxson</a>. Read the original post at: <a href="https://ironscales.com/blog/best-of-the-worst-april-25-2026">https://ironscales.com/blog/best-of-the-worst-april-25-2026</a> </p>

IRDAI 2026 Cybersecurity Guidelines for Insurance Companies

  • None
  • Published date: 2026-04-25 00:00:00

None

<p>The <strong>Insurance Regulatory and Development Authority of India (IRDAI)</strong> has introduced significant amendments to its cybersecurity guidelines in 2026, marking a shift from static compliance to <strong>continuous cyber resilience</strong>.</p><p>For insurers, <strong>IRDAI compliance</strong> is no longer just about implementing baseline controls. The updated framework demands <strong>stronger governance, tighter oversight, real-time monitoring, and accountability across business functions</strong>.</p><p>This blog breaks down the key changes in the <strong>IRDAI cybersecurity guidelines</strong>, compared to previous guidelines, along with a practical checklist to help insurers stay compliant.</p><h2 class="wp-block-heading"><strong>Key Changes in IRDAI 2026 Cybersecurity Guidelines</strong></h2><p>The 2026 amendments introduced by the Insurance Regulatory and Development Authority of India under the <strong>IRDAI guidelines for insurance companies 2026</strong> are not just incremental updates; they redefine how insurers approach governance, accountability, and security operations.</p><p>Below is a <strong>structured comparison of what has changed vs what’s new</strong>, based directly on the official Annexure.</p><h3 class="wp-block-heading">1) <strong>Applicability for Foreign Reinsurance Branches (FRBs)</strong></h3><h4 class="wp-block-heading"><strong>What Changed</strong></h4><figure class="wp-block-table"> <table class="has-fixed-layout"> <tbody> <tr> <td><strong>Earlier Guidelines</strong></td> <td><strong>2026 Update</strong></td> </tr> <tr> <td>No structured flexibility</td> <td>The ” Comply or Explain” approach was introduced</td> </tr> <tr> <td>Committees required at all levels</td> <td>Committees are not mandatory at the branch level if governance is handled centrally</td> </tr> </tbody> </table> </figure><h3 class="wp-block-heading"><strong>Impact</strong></h3><p>This introduces <strong>regulatory flexibility</strong>, while still maintaining supervisory oversight.</p><h3 class="wp-block-heading">2) <strong>Governance Frequency &amp; Oversight</strong></h3><h4 class="wp-block-heading"><strong>What Changed</strong></h4><figure class="wp-block-table"> <table class="has-fixed-layout"> <tbody> <tr> <td><strong>Earlier</strong></td> <td><strong>2026 Update </strong></td> </tr> <tr> <td>ISRMC Meetings </td> <td>Mandatory quarterly meetings </td> </tr> </tbody> </table> </figure><h4 class="wp-block-heading"><strong>Impact</strong></h4><p>This ensures <strong>continuous monitoring of cybersecurity risks</strong>, rather than periodic reviews.</p><h3 class="wp-block-heading"><strong>3) Board of Directors: Expanded Responsibilities</strong></h3><h4 class="wp-block-heading"><strong>What Changed</strong></h4><figure class="wp-block-table"> <table class="has-fixed-layout"> <tbody> <tr> <td><strong>Earlier </strong></td> <td><strong>2026 Update</strong> </td> </tr> <tr> <td>Limited cybersecurity oversight </td> <td>Defined Responsibilities added</td> </tr> </tbody> </table> </figure><h4 class="wp-block-heading"><strong>New Responsibilities </strong></h4><ul class="wp-block-list"> <li>Allocate an <strong>adequate cybersecurity budget</strong> aligned with risk appetite</li> <li>Review <strong>non-conformities from audit reports</strong></li> <li>Ensure <strong>closure of gaps within 12 months</strong></li> </ul><h3 class="wp-block-heading"><strong>Impact</strong></h3><p>Cybersecurity is now a <strong>board-level accountability</strong>, strengthening<mark class="has-inline-color has-luminous-vivid-orange-color"> </mark><a href="https://kratikal.com/irdai-compliance-audit"><mark class="has-inline-color has-luminous-vivid-orange-color">IRDAI compliance</mark></a><mark class="has-inline-color has-luminous-vivid-orange-color"><a href="https://kratikal.com/irdai-compliance-audit"> </a></mark>maturity.</p><h3 class="wp-block-heading">4) <strong>CISO Role: Independence &amp; Strategic Expansion</strong></h3><h4 class="wp-block-heading"><strong>What Changed</strong></h4><figure class="wp-block-table"> <table class="has-fixed-layout"> <tbody> <tr> <td><strong>Earlier </strong></td> <td><strong>2026 Update </strong></td> </tr> <tr> <td>CISO role aligned with IT</td> <td>CISO must be independent of IT Head</td> </tr> <tr> <td>Limited Scope</td> <td>Expanded operational and governance responsibilities</td> </tr> </tbody> </table> </figure><h3 class="wp-block-heading"><strong>New Additions</strong></h3><ul class="wp-block-list"> <li>No business targets for CISO</li> <li>Mandatory participation in Board and ISRMC briefings</li> <li>Permanent invitee to IT Steering Committee</li> <li>Responsible for <strong>scenario-based incident response planning</strong></li> <li>Must ensure compliance with <strong>CERT-In guidelines</strong></li> </ul><h3 class="wp-block-heading"><strong>Impact</strong></h3><p>The CISO role is now <strong>strategic, independent, and central to IRDAI compliance</strong>.</p><h3 class="wp-block-heading">5) <strong>CTO Role: Stronger Alignment with Security</strong></h3><h4 class="wp-block-heading"><strong>What Changed</strong></h4><figure class="wp-block-table"> <table class="has-fixed-layout"> <tbody> <tr> <td><strong>Earlier </strong></td> <td><strong>2026 Update</strong></td> </tr> <tr> <td>Focus on IT implementation</td> <td>Closer alignment with CISO and security standards</td> </tr> </tbody> </table> </figure><h3 class="wp-block-heading"><strong>New Responsibilities</strong></h3><ul class="wp-block-list"> <li>Support security implementation in consultation with CISO</li> <li>Ensure IT systems align with defined security standards</li> <li>Remediate vulnerabilities identified through audits</li> </ul><h3 class="wp-block-heading"><strong>Impact</strong></h3><p>Improves <strong>coordination between IT and security functions</strong>.</p><h3 class="wp-block-heading">6) <strong>Removal of CITSO Role</strong></h3><h4 class="wp-block-heading"><strong>What Changed</strong></h4><figure class="wp-block-table"> <table class="has-fixed-layout"> <tbody> <tr> <td><strong>Earlier </strong></td> <td><strong>2026 Update</strong></td> </tr> <tr> <td>Dedicated CITSO role existed</td> <td>Role Removed</td> </tr> </tbody> </table> </figure><h4 class="wp-block-heading"><strong>Impact</strong></h4><p>Responsibilities are now <strong>absorbed into CISO/CTO roles</strong>, simplifying governance structure.</p><h3 class="wp-block-heading">7) <strong>Business-Level Accountability Introduced</strong></h3><h4 class="wp-block-heading"><strong>What Changed</strong></h4><figure class="wp-block-table"> <table class="has-fixed-layout"> <tbody> <tr> <td><strong>Earlier </strong></td> <td><strong>2026 Update</strong></td> </tr> <tr> <td>Security responsibility limited to IT</td> <td>Functional heads now accountable</td> </tr> </tbody> </table> </figure><h4 class="wp-block-heading"><strong>New Responsibilities</strong></h4><ul class="wp-block-list"> <li>Enforce cybersecurity policies within teams</li> <li>Collaborate with CISO on risk management</li> <li>Report incidents promptly</li> </ul><h3 class="wp-block-heading"><strong>Impact</strong></h3><p>Cybersecurity becomes an <strong>organization-wide responsibility</strong>.</p><h3 class="wp-block-heading">8) <strong>IT Steering Committee (New Addition)</strong></h3><h4 class="wp-block-heading"><strong>What Changed</strong></h4><figure class="wp-block-table"> <table class="has-fixed-layout"> <tbody> <tr> <td><strong>Earlier </strong></td> <td><strong>2026 Update</strong></td> </tr> <tr> <td>No IT Steering Committee</td> <td>Mandatory ITSC introduced</td> </tr> </tbody> </table> </figure><h4 class="wp-block-heading"><strong>Key Responsibilities</strong></h4><ul class="wp-block-list"> <li>Align IT strategy with business and compliance needs</li> <li>Ensure regulatory compliance in IT architecture</li> <li>Oversee SLAs, procurement, and cloud decisions</li> <li>Monitor <strong>business continuity and disaster recovery</strong></li> </ul><h3 class="wp-block-heading"><strong>Impact</strong></h3><p>Brings <strong>structured governance over IT and cybersecurity decisions</strong></p><h3 class="wp-block-heading"><strong>9) Control Management Committee (CMC) Removed</strong></h3><h4 class="wp-block-heading"><strong>What Changed</strong></h4><figure class="wp-block-table"> <table class="has-fixed-layout"> <tbody> <tr> <td><strong>Earlier </strong></td> <td><strong>2026 Update</strong></td> </tr> <tr> <td>Dedicated CMC existed</td> <td>CMC removed</td> </tr> </tbody> </table> </figure><h3 class="wp-block-heading"><strong>Impact</strong></h3><p>Responsibilities are now <strong>merged into the Risk Management Committee (RMC)</strong>, simplifying governance layers.</p><h3 class="wp-block-heading">10) <strong>Independent External Experts Added</strong></h3><h4 class="wp-block-heading"><strong>What Changed</strong></h4><figure class="wp-block-table"> <table class="has-fixed-layout"> <tbody> <tr> <td><strong>Earlier </strong></td> <td><strong>2026 Update</strong></td> </tr> <tr> <td>No Requirement</td> <td>External cybersecurity experts mandatory in RMC</td> </tr> </tbody> </table> </figure><h4 class="wp-block-heading"><strong>Impact</strong></h4><p>Enhances <strong>decision-making with specialized cybersecurity expertise</strong>.</p><h3 class="wp-block-heading">11) <strong>Exception Management Framework Introduced</strong></h3><h4 class="wp-block-heading"><strong>What Changed</strong></h4><figure class="wp-block-table"> <table class="has-fixed-layout"> <tbody> <tr> <td><strong>Earlier </strong></td> <td><strong>2026 Update</strong></td> </tr> <tr> <td>No structured framework</td> <td>Defined approval hierarchy and timelines</td> </tr> </tbody> </table> </figure><h4 class="wp-block-heading"><strong>New Structure</strong></h4><ul class="wp-block-list"> <li>Up to 3 months → CISO approval</li> <li>3–12 months → RMC approval</li> <li>Beyond 12 months → Board approval</li> <li>Mandatory <strong>risk documentation and reassessment</strong></li> </ul><h3 class="wp-block-heading"><strong>Impact</strong></h3><p>Ensures <strong>controlled and accountable exception handling</strong>.</p><h3 class="wp-block-heading">12) <strong>Compliance &amp; Audit Enhancements</strong></h3><h4 class="wp-block-heading"><strong>What Changed</strong></h4><figure class="wp-block-table"> <table class="has-fixed-layout"> <tbody> <tr> <td>Alignment with the DPDP Act introduced </td> <td><strong>2026 Update</strong></td> </tr> <tr> <td>Annual submissions</td> <td>Submission within 30 days of audit completion</td> </tr> <tr> <td>Limited regulatory Linkage </td> <td>Alignment with the <a href="https://kratikal.com/blog/understanding-indias-dpdp-act-a-complete-overview/"><mark class="has-inline-color has-luminous-vivid-orange-color">DPDP Act</mark></a> introduced </td> </tr> </tbody> </table> </figure><h4 class="wp-block-heading"><strong>Impact</strong></h4><p>Drives <strong>faster reporting and stronger data protection compliance</strong>.</p><h3 class="wp-block-heading">13) <strong>Security Controls: New Technical Requirements</strong></h3><h3 class="wp-block-heading"><strong>Key Additions</strong></h3><ul class="wp-block-list"> <li>Infrastructure Segregation across group entities</li> <li>Grey/White-box penetration testing every 6 months</li> <li>Testing environments must mirror production systems</li> <li>Cryptographic asset inventory (post-quantum readiness)</li> <li>Strict vendor outsourcing approvals</li> <li>Mandatory MeitY-empaneled cloud providers</li> <li>Data deletion requirements for cloud exit</li> <li>Immutable backups and resilient systems</li> </ul><h3 class="wp-block-heading"><strong>Impact</strong></h3><p>These controls significantly enhance the <strong>technical depth and future readiness</strong> of IRDAI compliance.</p><p><br> <br> </p><br><meta charset="UTF-8"><br><meta name="viewport" content="width=device-width, initial-scale=1.0"><p> <!-- IMPORTANT: SEO control --><br> <meta name="robots" content="noindex, nofollow"></p><p> </p><title>Blog Form</title><br><div class="containers"> <!-- Left Section --> <div class="left-section"> <p class="heading-wrap">Book Your Free Cybersecurity Consultation Today!</p> <p> <img decoding="async" src="https://awareness.threatcop.ai/marketing/new_asset_blog_form.svg" alt="People working on cybersecurity" class="consultation-image"> </p></div> <p> <!-- Right Section --></p> <div class="right-section"> <div class="form-containers"> <form action="https://kratikal.com/thanks/thankyou-blog" method="get" onsubmit="return validateForm(this)"> <div class="form-group"> <label for="fullName">Full Name</label><br> <input type="text" required name="FullName" placeholder="Enter full name"> </div> <div class="form-group"> <label for="email">Email ID</label><br> <input type="email" required name="email" placeholder="your name @ example.com"> </div> <div class="form-group"> <label for="company">Company Name</label><br> <input type="text" required name="CompanyName" placeholder="Enter company name"> </div> <div class="form-group"> <label for="phone">Phone Number</label><br> <input type="number" required name="Phone" placeholder="Enter phone number"> </div> <p> <input type="hidden" name="BlogForm" value="BlogForm"><br> <button type="submit" class="submit-btnns" name="submit" value="I am interested!">I am interested!</button><br> </p></form> </div> </div> </div><p><!-- CSS Styles --></p><style> .containers{ display: flex; width: 100%; max-width: 800px; height: 500px; box-shadow: 0 0 10px rgba(0, 0, 0, 0.1); border-radius: 4px; overflow: hidden; margin: 25px auto; } .left-section { width: 50%; background-color: #000; color: white; padding: 30px; display: flex; flex-direction: column; position: relative; overflow: hidden; } .left-section .heading-wrap { font-size: 24px; line-height: 40px; margin-bottom: 30px; z-index: 2; position: relative; color: white; } .consultation-image { position: absolute; bottom: 0; left: 0; width: 100%; height: 70%; object-fit: cover; object-position: center; } .right-section { width: 50%; background-color: white; padding: 30px; display: flex; flex-direction: column; justify-content: center; } .form-containers { width: 100%; } .form-group { margin-bottom: 20px; } label { display: block; color: #666; margin-bottom: 5px; font-size: 14px; } .right-section input { width: 88%; padding: 12px 15px; border: 1px solid #e0e0e0; border-radius: 8px; font-size: 16px; } .submit-btnns { width: 100%; padding: 15px; background: linear-gradient(to right, #e67e22, #d35400); border: none; border-radius: 8px; color: white; font-size: 18px; font-weight: bold; cursor: pointer; margin-top: 10px; } /* Responsive */ @media (max-width: 768px) { .containers { flex-direction: column; height: auto; } .left-section, .right-section { width: 100%; } .left-section { height: 400px; } .consultation-image { height: 60%; } } @media (max-width: 480px) { .left-section { padding: 20px; height: 350px; } .left-section .heading-wrap { font-size: 17px; line-height: 28px;width: 80%; } .right-section { padding: 20px; } .right-section input, .submit-btnns { padding: 10px; } } </style><p><!-- JS Validation --><br> <script> function validateForm(form) { const inputs = form.querySelectorAll("input[type=text], input[type=email], input[type=number]"); for (let i = 0; i < inputs.length; i++) { if (/[<>]/.test(inputs[i].value)) { alert("Tags and attributes are not allowed in form fields!"); return false; // prevent submission } } return true; // allow submission } </script><br> <script defer src="https://static.cloudflareinsights.com/beacon.min.js/v8c78df7c7c0f484497ecbca7046644da1771523124516" integrity="sha512-8DS7rgIrAmghBFwoOTujcf6D9rXvH8xm8JQ1Ja01h9QX8EzXldiszufYa4IFfKdLUKTTrnSFXLDkUEOTrZQ8Qg==" data-cf-beacon='{"version":"2024.11.0","token":"33edbdb5f462496f85e52978979b687b","server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}' crossorigin="anonymous"></script> <script>(function(){function c(){var b=a.contentDocument||a.contentWindow.document;if(b){var d=b.createElement('script');d.innerHTML="window.__CF$cv$params={r:'9f1e37954c32a24d',t:'MTc3NzEyOTIyNA=='};var a=document.createElement('script');a.src='/cdn-cgi/challenge-platform/scripts/jsd/main.js';document.getElementsByTagName('head')[0].appendChild(a);";b.getElementsByTagName('head')[0].appendChild(d)}}if(document.body){var a=document.createElement('iframe');a.height=1;a.width=1;a.style.position='absolute';a.style.top=0;a.style.left=0;a.style.border='none';a.style.visibility='hidden';document.body.appendChild(a);if('loading'!==document.readyState)c();else if(window.addEventListener)document.addEventListener('DOMContentLoaded',c);else{var e=document.onreadystatechange||function(){};document.onreadystatechange=function(b){e(b);'loading'!==document.readyState&&(document.onreadystatechange=e,c())}}}})();</script></p><h3 class="wp-block-heading"><strong>IRDAI Compliance Checklist for Insurers (2026)</strong></h3><p>To simplify implementation, here’s a practical checklist:</p><h3 class="wp-block-heading"><strong>Governance</strong></h3><ul class="wp-block-list"> <li>Ensure quarterly ISRMC and ITSC meetings</li> <li>Strengthen board-level cybersecurity oversight</li> <li>Appoint independent cybersecurity experts</li> </ul><h3 class="wp-block-heading"><strong>Leadership</strong></h3><ul class="wp-block-list"> <li>Establish an independent CISO role</li> <li>Define clear responsibilities for the CTO and business heads</li> </ul><h3 class="wp-block-heading"><strong>Security Operations</strong></h3><ul class="wp-block-list"> <li>Implement scenario-based incident response plans</li> <li>Conduct biannual penetration testing (CERT-In auditors)</li> <li>Enable continuous monitoring and detection</li> </ul><h3 class="wp-block-heading"><strong>Cloud &amp; Third-Party Risk</strong></h3><ul class="wp-block-list"> <li>Use MeitY-empaneled cloud providers</li> <li>Enforce strict vendor contracts and NDAs</li> <li>Control sub-outsourcing risks</li> </ul><h3 class="wp-block-heading"><strong>Advanced Security</strong></h3><ul class="wp-block-list"> <li>Maintain cryptographic asset inventory</li> <li>Deploy immutable backups</li> <li>Ensure system resilience and failover</li> </ul><h3 class="wp-block-heading"><strong>Compliance &amp; Audit</strong></h3><ul class="wp-block-list"> <li>Complete annual audits within defined timelines</li> <li>Align with DPDP Act requirements</li> <li>Implement the “comply or explain” framework</li> </ul><h3 class="wp-block-heading"><strong>Exception Management</strong></h3><ul class="wp-block-list"> <li>Follow the structured approval hierarchy</li> <li>Document all risks and approvals</li> <li>Reassess long-term exceptions</li> </ul><p><br> <br> </p><br><meta charset="UTF-8"><br><meta name="viewport" content="width=device-width, initial-scale=1.0"><br><title>Cyber Security Squad – Newsletter Signup</title><link rel="stylesheet" href="https://kratikal.com/blog/irdai-2026-cybersecurity-guidelines-for-insurance-companies/styles.css"><link rel="preconnect" href="https://fonts.googleapis.com/"><link rel="preconnect" href="https://fonts.gstatic.com/" crossorigin><link href="https://fonts.googleapis.com/css2?family=Roboto:wght@400;500;700&amp;display=swap" rel="stylesheet"><style type="text/css"> /* Reset and base styles */</p> <p>.newsletterwrap .containerWrap { width: 100%; max-width: 800px; margin: 25px auto; }</p> <p>/* Card styles */ .newsletterwrap .signup-card { background-color: white; border-radius: 10px; overflow: hidden; box-shadow: 0 4px 12px rgba(0, 0, 0, 0.1); border: 8px solid #e85d0f; }</p> <p>.newsletterwrap .content { padding: 30px; display: flex; justify-content: space-between; align-items: center; flex-wrap: wrap; }</p> <p>/* Text content */ .newsletterwrap .text-content { flex: 1; min-width: 250px; margin-right: 20px; }</p> <p>.newsletterwrap .main-heading { font-size: 26px; color: #333; font-weight: 900; margin-bottom: 0px; }</p> <p>.newsletterwrap .highlight { color: #e85d0f; font-weight: 500; margin-bottom: 15px; }</p> <p>.newsletterwrap .para { color: #666; line-height: 1.5; margin-bottom: 10px; }</p> <p>.newsletterwrap .bold { font-weight: 700; }</p> <p>/* Logo */ .newsletterwrap .rightlogo { display: flex; flex-direction: column; align-items: center; margin-top: 10px; }</p> <p>.newsletterwrap .logo-icon { position: relative; width: 80px; height: 80px; margin-bottom: 10px; }</p> <p>.newsletterwrap .c-outer, .c-middle, .c-inner { position: absolute; border-radius: 50%; border: 6px solid #e85d0f; border-right-color: transparent; }</p> <p>.newsletterwrap .c-outer { width: 80px; height: 80px; top: 0; left: 0; }</p> <p>.newsletterwrap .c-middle { width: 60px; height: 60px; top: 10px; left: 10px; }</p> <p>.newsletterwrap .c-inner { width: 40px; height: 40px; top: 20px; left: 20px; }</p> <p>.newsletterwrap .logo-text { color: #e85d0f; font-weight: 700; font-size: 0.9rem; text-align: center; }</p> <p>/* Form */ .newsletterwrap .signup-form { display: flex; padding: 0 30px 30px; }</p> <p>.newsletterwrap input[type="email"] { flex: 1; padding: 12px 15px; border: 1px solid #ddd; border-radius: 4px 0 0 4px; font-size: 1rem; outline: none; }</p> <p>.newsletterwrap input[type="email"]:focus { border-color: #e85d0f; }</p> <p>.newsletterwrap .submitBtn { background-color: #e85d0f; color: white; border: none; padding: 12px 20px; border-radius: 0 4px 4px 0; font-size: 1rem; cursor: pointer; transition: background-color 0.3s; white-space: nowrap; }</p> <p>.newsletterwrap button:hover { background-color: #d45000; }</p> <p>/* Responsive styles */ @media (max-width: 768px) { .newsletterwrap .content { flex-direction: column; text-align: center; }</p> <p> .newsletterwrap .text-content { margin-right: 0; margin-bottom: 20px; }</p> <p> .newsletterwrap .rightlogo { margin-top: 20px; } }</p> <p>@media (max-width: 480px) { .newsletterwrap .signup-form { flex-direction: column; }</p> <p> .newsletterwrap input[type="email"] { border-radius: 4px; margin-bottom: 10px; }</p> <p> .newsletterwrap .submitBtn { border-radius: 4px; width: 100%; } } </style><p><br> </p><div class="containerWrap"> <div class="signup-card"> <div class="content"> <div class="text-content"> <h1 class="main-heading">Get in!</h1> <p class="para">Join our weekly <span style="color: #e75d10;">newsletter</span> and stay updated</p> </div> <div class="rightlogo"> <div class="logo-icon"> <div class="c-outer"></div> <div class="c-middle"></div> <div class="c-inner"></div> </div> <div class="logo-text">CYBER SECURITY SQUAD</div> </div> </div> <form class="signup-form" action="https://kratikal.com/thanks/thankyou-newsletter" method="get"> <input type="email" name="email" value="" placeholder="Email" required><br> <input type="submit" name="submit" value="I am interested!" class="submitBtn"><br> </form> </div> </div><p><br> </p><h3 class="wp-block-heading">Conclusion </h3><p>The IRDAI guidelines 2026 clearly signal a shift from <strong>static, checklist-driven compliance to a dynamic, risk-based security approach</strong>.</p><p>For insurers, <a href="https://kratikal.com/blog/what-is-irdai-compliance-guidelines-for-the-insurer/"><mark class="has-inline-color has-luminous-vivid-orange-color"><strong>IRDAI compliance</strong> </mark></a>is no longer limited to implementing controls once a year; it now requires <strong>continuous governance, cross-functional accountability, and real-time visibility into cyber risks</strong>. From strengthening board oversight and redefining the CISO’s role to introducing advanced controls like cryptographic readiness and stricter third-party governance, the updates reflect the realities of today’s threat landscape. Organizations that proactively align with these changes will not only meet regulatory expectations but also build <strong>resilient, future-ready security frameworks</strong>. On the other hand, those treating compliance as a one-time activity risk falling behind, both in security maturity and regulatory readiness.</p><h3 class="wp-block-heading">FAQs</h3><div class="schema-how-to wp-block-yoast-how-to-block"> <p class="schema-how-to-description"> </p><ol class="schema-how-to-steps"> <li class="schema-how-to-step" id="how-to-step-1777011045277"><strong class="schema-how-to-step-name"><strong>What is the key objective of IRDAI compliance in 2026?</strong></strong> <p class="schema-how-to-step-text">The primary objective of IRDAI compliance is to ensure that insurers adopt a risk-based, proactive cybersecurity approach that protects policyholder data. It also aims to strengthen operational resilience and align security practices with evolving cyber threats.</p> </li> <li class="schema-how-to-step" id="how-to-step-1777014277560"><strong class="schema-how-to-step-name"><strong>How has the role of the CISO changed in the 2026 guidelines?</strong></strong> <p class="schema-how-to-step-text">The CISO role has become more <strong>independent and strategic</strong>. The CISO must not report to the IT Head, cannot have business targets, and is responsible for incident response planning, board reporting, and compliance with CERT-In guidelines.</p> </li> <li class="schema-how-to-step" id="how-to-step-1777014289483"><strong class="schema-how-to-step-name"><strong>What is the role of the IT Steering Committee (ITSC)?</strong></strong> <p class="schema-how-to-step-text">The ITSC is a newly introduced body responsible for aligning IT strategy with business and regulatory requirements, overseeing IT architecture, and ensuring cybersecurity integration in all technology decisions.</p> </li> </ol> </div><p>The post <a href="https://kratikal.com/blog/irdai-2026-cybersecurity-guidelines-for-insurance-companies/">IRDAI 2026 Cybersecurity Guidelines for Insurance Companies</a> appeared first on <a href="https://kratikal.com/blog">Kratikal Blogs</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/irdai-2026-cybersecurity-guidelines-for-insurance-companies/" data-a2a-title="IRDAI 2026 Cybersecurity Guidelines for Insurance Companies"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Firdai-2026-cybersecurity-guidelines-for-insurance-companies%2F&amp;linkname=IRDAI%202026%20Cybersecurity%20Guidelines%20for%20Insurance%20Companies" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Firdai-2026-cybersecurity-guidelines-for-insurance-companies%2F&amp;linkname=IRDAI%202026%20Cybersecurity%20Guidelines%20for%20Insurance%20Companies" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Firdai-2026-cybersecurity-guidelines-for-insurance-companies%2F&amp;linkname=IRDAI%202026%20Cybersecurity%20Guidelines%20for%20Insurance%20Companies" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Firdai-2026-cybersecurity-guidelines-for-insurance-companies%2F&amp;linkname=IRDAI%202026%20Cybersecurity%20Guidelines%20for%20Insurance%20Companies" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Firdai-2026-cybersecurity-guidelines-for-insurance-companies%2F&amp;linkname=IRDAI%202026%20Cybersecurity%20Guidelines%20for%20Insurance%20Companies" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://kratikal.com/blog/">Kratikal Blogs</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Shikha Dhingra">Shikha Dhingra</a>. Read the original post at: <a href="https://kratikal.com/blog/irdai-2026-cybersecurity-guidelines-for-insurance-companies/">https://kratikal.com/blog/irdai-2026-cybersecurity-guidelines-for-insurance-companies/</a> </p>

13 Hidden Costs of Password-Based Authentication (With Real ROI Math)

  • None
  • Published date: 2026-04-25 00:00:00

None

<p>The post <a href="https://mojoauth.com/blog/13-hidden-costs-of-password-based-authentication-with-real-roi-math">13 Hidden Costs of Password-Based Authentication (With Real ROI Math)</a> appeared first on <a href="https://mojoauth.com/blog">MojoAuth Blog – Passwordless Authentication &amp; Identity Solutions</a>.</p><p>Passwords aren't free. Most organizations treat authentication as a fixed cost of doing business, something that lives in the IT budget and doesn't get interrogated at the CFO level. That's a mistake. When you add up password resets, support overhead, SMS delivery fees, breach exposure, compliance fines, and conversion losses, the annual cost of maintaining a password-based authentication system is almost always larger than the cost of replacing it. This article puts hard numbers on each line item and gives you a simple formula to calculate what passwords are actually costing your business right now.</p><h2>Key Takeaways</h2><ul> <li> <p>A single password reset costs an average of $70 in fully loaded IT labor, according to Forrester Research. At 10,000 resets per year, that's $700,000 before anything else is counted.</p> </li> <li> <p>IBM's 2024 Cost of a Data Breach report puts the average breach at $4.88 million, with credential-based attacks being the leading initial attack vector.</p> </li> <li> <p>SMS OTP delivery fees alone can reach $50,000 to $100,000+ annually at 500,000 monthly active users.</p> </li> <li> <p>Passwordless authentication (FIDO2 passkeys, biometric-bound credentials) eliminates or dramatically reduces the majority of these cost categories simultaneously.</p> </li> <li> <p>The ROI math on going passwordless typically closes within 12 to 18 months, often much faster for high-volume consumer platforms.</p> </li> </ul><h2>Why Password Costs Are So Hard to See</h2><p>Password costs don't show up on one budget line. They're distributed across IT support, engineering, security, legal, marketing (churn), and revenue (conversion). Each department sees their slice and assumes someone else is tracking the total. Almost nobody is.</p><p>The finance team sees the support contract. The security team sees the breach risk. The product team sees the conversion drop. The CFO sees none of it as a unified number. That's exactly why the business case for passwordless is so hard to make internally, not because the math doesn't work, but because the costs are invisible in the aggregate.</p><p>What follows is a CFO-level breakdown of all 13 cost categories, with the numbers to back them up.</p><hr><h2>The 13 Real Costs of Password-Based Authentication</h2><h3>1. $70 Per Password Reset (And You're Doing Thousands of Them)</h3><p>Forrester Research's widely cited benchmark puts the fully loaded cost of a single password reset at $70. That figure includes the labor cost of a help desk agent handling the ticket, the time the employee spends locked out and unproductive, and the overhead of the identity verification process that precedes the reset.</p><p>For a company with 5,000 employees, industry estimates suggest that between 20% and 50% of help desk tickets are password-related. If your team handles 500 resets per month, that's $420,000 per year in reset costs alone. If you're running a consumer platform with millions of users, the number scales proportionally and becomes one of the largest line items in your support budget.</p><p>It sounds like a small problem until you do the multiplication.</p><h3>2. $4.88 Million Average Cost of a Credential-Linked Data Breach</h3><p>IBM's 2024 Cost of a Data Breach Report found that the global average cost of a data breach has reached $4.88 million. Credential compromise, including stolen credentials, phishing, and brute force, remains the most common initial attack vector, accounting for roughly 16% of breaches analyzed.</p><p>That $4.88 million figure covers detection and escalation, notification costs, post-breach response, and long-term business impact including customer churn and reputational damage. For regulated industries like healthcare and financial services, the average is considerably higher. Healthcare breaches averaged $9.77 million in the same report.</p><p>What's important for the business case is that this isn't a tail risk. If your organization runs password-based authentication and your users reuse credentials (which they do, at rates exceeding 60% according to multiple surveys), a credential-based breach is not a question of if but when.</p><h3>3. 25% User Abandonment at Password-Based Registration</h3><p>Every authentication friction point costs you conversions, and password-based registration is one of the highest-friction onboarding experiences in consumer software. Research from Baymard Institute and various product analytics firms consistently shows that password creation requirements, email verification steps, and "confirm your password" fields contribute to abandonment rates of 25% or higher at registration.</p><p>If you're acquiring 10,000 new users per month and losing 25% of them at the registration screen, you're losing 2,500 potential customers every month to a UX problem that is entirely self-inflicted. At even a modest average customer lifetime value of $200, that's $500,000 in lost lifetime revenue per month from one friction point.</p><p>Passwordless registration flows using passkeys or magic links consistently reduce abandonment by 20% to 40% in documented implementations because there's no password to create, confirm, or forget.</p><h3>4. 10 to 15% Conversion Drop Per Added Authentication Step</h3><p>Authentication doesn't only affect registration. Every time a returning user hits a login screen, you're applying friction to a revenue-generating action. E-commerce platforms, fintech apps, travel booking systems, and subscription services all measure login conversion rates because a user who can't or won't log in is a user who can't buy.</p><p>Studies on checkout conversion consistently show that each additional authentication step (entering a password, completing a CAPTCHA, confirming an SMS code) reduces conversion by 10% to 15%. In high-intent, high-ticket environments like airline booking or financial transactions, that drop directly translates to lost revenue.</p><p>A travel platform doing $50 million in annual revenue with a 2-step authentication flow that converts at 72% instead of 85% is leaving over $6 million per year on the table. See <a href="https://mojoauth.com/blog/how-authentication-friction-affects-conversion-rates-the-data-behind-frictionless-login">how passwordless authentication improves conversion rates</a> in high-ticket B2C environments.</p><h3>5. Up to 40% of Support Tickets Are Authentication-Related</h3><p>Gartner estimates that between 20% and 50% of all help desk calls are password-related. MojoAuth's own customer data puts the figure closer to 40% for enterprise deployments before passwordless is implemented. These aren't complex issues. They're repetitive, low-skill tasks (password resets, account unlocks, MFA re-enrollment) that consume a disproportionate share of your support team's time.</p><p>A support team of 10 people with an average fully loaded cost of $65,000 per year represents a $650,000 annual line item. If 40% of their time is spent on authentication tickets, that's $260,000 per year in support capacity consumed by a problem that passwordless authentication largely eliminates. That money can be redeployed to higher-value work or returned as margin improvement.</p><h3>6. Infrastructure Costs From Bot Traffic During Credential Stuffing</h3><p>Credential stuffing attacks generate enormous volumes of automated traffic against login endpoints. Bots testing millions of username-and-password combinations against your API don't just create a security risk. They create an infrastructure cost. Your servers process those requests. Your CDN delivers those responses. Your database handles those queries. You pay for all of it.</p><p>Organizations that have instrumented their login infrastructure report that bot traffic can represent 50% to 90% of total authentication requests during active credential stuffing campaigns. At cloud infrastructure pricing, that can add tens of thousands of dollars in monthly compute and bandwidth costs that appear in your AWS or Azure bill without any obvious label saying "caused by credential stuffing."</p><p>Anti-bot tooling (CAPTCHA, rate limiting, WAF rules) adds further cost and maintenance overhead. Passwordless authentication removes the attack surface entirely. If there's no password endpoint to stuff, the bot traffic has no target.</p><h3>7. Compliance Fines Tied to Weak Authentication</h3><p>Regulatory bodies across the globe are increasingly treating inadequate authentication as a compliance failure, not just a security oversight. The precedents are now well established:</p><p>The UK Information Commissioner's Office fined 23andMe £2.31 million in 2025 explicitly for failing to implement adequate protections against credential stuffing, including multi-factor authentication. The FTC pursued action against Dunkin' Donuts over its handling of credential stuffing attacks on its loyalty program. GDPR fines for data breaches enabled by weak authentication have exceeded €1 billion in aggregate since 2018.</p><p>For a CFO building a business case, the compliance angle is compelling because it converts a probabilistic security risk into a quantifiable expected cost. If your industry has a 5% annual probability of a credential-related incident and the average regulatory fine in your jurisdiction is $2 million, the expected annual compliance cost of not upgrading authentication is $100,000 per year, before the breach remediation costs are counted.</p><h3>8. Engineering Talent Attrition From Rebuilding Broken Auth Stacks</h3><p>This one doesn't appear in any analyst report, but it's real and it's expensive. Password-based authentication stacks require constant maintenance: password hashing algorithm upgrades, forced rotation policies, breach detection integrations, session management, CAPTCHA updates, and bot mitigation rule tuning. It's unglamorous, repetitive work that senior engineers hate.</p><p>Replacing a departing senior engineer costs between 50% and 200% of their annual salary in recruiting, onboarding, and lost productivity. If your authentication maintenance work is contributing to attrition among even one or two engineers per year, the talent cost alone can exceed the cost of implementing a passwordless solution.</p><p>The secondary cost is opportunity cost. Engineering hours spent maintaining a password system are hours not spent building product features that generate revenue. Every sprint devoted to password complexity rules and session expiry logic is a sprint not devoted to your roadmap.</p><h3>9. Cyber-Insurance Premium Surcharges for Password-Only Systems</h3><p>The cyber-insurance market has changed materially over the past three years. Underwriters now routinely audit authentication practices as part of policy renewals, and organizations that cannot demonstrate phishing-resistant MFA or passwordless authentication face premium surcharges of 20% to 40% compared to organizations with stronger controls.</p><p>At a $500,000 annual cyber-insurance premium, a 30% surcharge for inadequate authentication controls costs $150,000 per year. That surcharge is, in effect, a tax on not having implemented better authentication. For organizations with higher premiums (financial services, healthcare, critical infrastructure), the numbers scale accordingly.</p><p>Some underwriters have begun excluding credential stuffing and account takeover losses from policies that don't meet minimum authentication standards. That's not a surcharge. That's a complete gap in coverage.</p><h3>10. Lost Revenue From Account Lockouts in High-Ticket B2C</h3><p>Account lockout policies are a standard brute force mitigation. Lock the account after five failed login attempts and you stop automated password attacks. You also lock out legitimate users who've forgotten their passwords, are typing on an unfamiliar device, or have had their account flagged erroneously.</p><p>In high-intent, time-sensitive verticals, an account lockout is a lost sale. A traveler who can't log in to complete a flight booking during a limited fare window doesn't call support. They book with a competitor. A fintech customer locked out during a market move doesn't wait 24 hours for account recovery. They use a different app.</p><p>Conservative estimates from e-commerce and travel analytics firms suggest that account lockout abandonment costs high-ticket B2C platforms between 1% and 3% of authenticated session revenue annually. On a $100 million revenue base, that range is $1 million to $3 million per year.</p><h3>11. Customer Churn After Account Takeover Incidents</h3><p>When a customer's account is taken over, the financial harm doesn't end with the immediate fraud loss. The customer relationship is almost certainly damaged, and a significant portion of affected customers don't come back. Research from Ping Identity found that 44% of consumers would stop using a company's services after a security incident, and that figure rises to over 60% for incidents where financial data was involved.</p><p>Account takeover churn is also contagious. Customers who experience ATO tell people. Public ATO incidents generate negative press and social media coverage that depress new user acquisition for months. The DraftKings credential stuffing incident in 2022, where approximately $300,000 was drained from customer accounts, generated press coverage that almost certainly cost the company more in reputational damage than the direct fraud losses.</p><p>At an average customer lifetime value of $500 and an ATO incident affecting 1,000 customers with a 44% churn rate, the churn cost alone is $220,000 per incident, before legal, remediation, or PR costs.</p><h3>12. SMS OTP Delivery Fees Scaling to $50,000 to $100,000+ Annually</h3><p>This is one of the most overlooked and most predictable costs in the authentication budget. SMS-based one-time passwords are sent via third-party messaging APIs (Twilio, Vonage, AWS SNS), and the cost is per-message. In the United States, SMS delivery costs typically run between $0.0075 and $0.01 per message. Internationally, rates are higher, sometimes significantly so.</p><p>At 500,000 monthly active users with a 70% SMS OTP trigger rate (logins that require a code), that's 350,000 messages per month. At $0.0085 per message, that's approximately $2,975 per month, or around $35,700 per year at domestic rates. Add international traffic, failed delivery retries, and the common practice of sending a second code when users complain the first didn't arrive, and real-world costs routinely land at $50,000 to $100,000 annually for mid-sized platforms.</p><p>At 5 million MAU, the same math produces SMS delivery costs approaching $350,000 to $1 million per year. These fees appear in cloud billing or vendor invoices as operational costs. They're real cash out the door, every month, for a security mechanism that NIST has deprecated and that SIM swapping can defeat in minutes. See <a href="https://mojoauth.com/blog/complete-guide-to-passkeys-implementation-benefits-best-practices">how replacing SMS OTP with passkeys eliminates this cost category entirely</a>.</p><h3>13. Legal and PR Response Costs for Credential-Related Breaches</h3><p>When a credential-based breach occurs, the financial exposure doesn't stop at the breach itself. The incident response process generates substantial costs that are rarely fully anticipated in pre-breach risk models:</p><p>Legal costs include outside counsel for breach notification compliance, regulatory communications, and litigation defense. A mid-sized breach can generate $500,000 to $2 million in legal fees before any settlement is reached. Mandatory breach notification under GDPR, CCPA, and sector-specific regulations (HIPAA, PCI-DSS) involves significant operational effort including identifying affected users, drafting notifications, and managing regulator inquiries.</p><p>PR and crisis communications costs for a public breach typically range from $50,000 to $500,000 depending on the scale and media coverage of the incident. Executive time consumed by board-level incident briefings, regulator meetings, and customer communications is a real cost even if it doesn't appear on an invoice.</p><p>IBM's 2024 data shows that the average time to identify and contain a breach is 258 days. The extended detection window is itself a cost multiplier, every day of undetected access increases the scope of the breach and the cost of remediation.</p><hr><h2>The Annual Password Tax: A Simple ROI Worksheet</h2><p>Here's a formula you can fill in with your own numbers to calculate what passwords are actually costing your organization per year. We call it the Annual Password Tax.</p><p><strong>Annual Password Tax Formula:</strong></p><pre><code>(Monthly password resets × 12 × $70) + (Annual breach probability × average breach cost) + (Lost registrations × monthly acquisition × 12 × average LTV) + (Annual support headcount × $65,000 × 40%) + (Monthly SMS messages × 12 × $0.0085) + (Annual cyber-insurance premium × 30% surcharge estimate) + (ATO-related churn: affected accounts × average LTV × 44%) = Your Annual Password Tax </code></pre><p><strong>Example Calculation for a Mid-Market SaaS Platform:</strong></p><ul> <li> <p>800 monthly resets × 12 × $70 = $672,000</p> </li> <li> <p>10% breach probability × $4.88M average = $488,000 expected annual cost</p> </li> <li> <p>2,000 lost registrations per month × 12 × $150 LTV = $3,600,000</p> </li> <li> <p>5 support staff × $65,000 × 40% = $130,000</p> </li> <li> <p>200,000 monthly SMS × 12 × $0.0085 = $20,400</p> </li> <li> <p>$200,000 insurance premium × 30% = $60,000</p> </li> <li> <p>500 ATO victims × $150 LTV × 44% = $33,000</p> </li> </ul><p><strong>Total Annual Password Tax: approximately $5,003,400</strong></p><p>For many mid-market platforms, the math produces a number in the range of $2 million to $8 million per year. The cost of implementing a passwordless authentication solution? Typically a fraction of that, with ROI that closes within 12 to 18 months in most documented deployments.</p><hr><h2>How Passwordless Authentication Addresses Each Cost Category</h2><p>Passwordless authentication using FIDO2 passkeys doesn't improve these numbers marginally. It eliminates several of them entirely and dramatically reduces the rest.</p><p>Password resets drop to near zero because there is no password to reset. A user who gets a new device re-enrolls a passkey through a recovery flow that doesn't require a help desk agent. Support ticket volumes tied to authentication fall by 30% to 50% in documented enterprise deployments.</p><p>Credential stuffing attack traffic disappears as an infrastructure cost because there is no password endpoint. No password, no stuffing, no bot traffic to absorb.</p><p>SMS OTP costs go to zero if SMS is removed from the authentication flow entirely. The savings in year one often cover a significant portion of the implementation cost.</p><p>Conversion rates at registration and login improve because biometric authentication (face ID, fingerprint) is faster than typing a password and completing an OTP challenge. Documented improvements range from 20% to 50% reduction in authentication-related abandonment.</p><p>Compliance posture improves because FIDO2 passkeys meet the "phishing-resistant MFA" standard required by NIST SP 800-63B, which regulators including the ICO, CISA, and various sector bodies are actively referencing in enforcement actions.</p><hr><h2>Frequently Asked Questions</h2><h3>How Much Does a Password Reset Actually Cost?</h3><p>The Forrester Research benchmark puts the fully loaded cost of a single enterprise password reset at $70. This includes help desk agent labor, the productivity loss of the employee during the lockout period, and identity verification overhead. Consumer-facing resets at scale have lower per-unit costs but multiply across larger user bases. Organizations routinely find that password reset costs alone justify a significant portion of the investment in passwordless infrastructure.</p><h3>What Percentage of IT Support Tickets Are Password-Related?</h3><p>Industry estimates from Gartner and other analysts range from 20% to 50%, with many enterprise IT teams reporting figures closer to 40% when all authentication-related tickets are counted (password resets, MFA re-enrollment, account unlocks, SSO troubleshooting). This makes authentication management one of the largest single categories of IT support volume, consuming skilled labor on highly repetitive, low-complexity tasks.</p><h3>How Do SMS OTP Costs Scale With User Volume?</h3><p>SMS delivery costs through providers like Twilio and Vonage typically range from $0.0075 to $0.01 per message in the US market. At 500,000 monthly active users with a 70% SMS trigger rate, that produces approximately $35,000 to $50,000 annually at domestic rates. International rates are often 3x to 10x higher. Platforms with significant international user bases, or with high login frequency (daily active users in fintech or e-commerce), can see SMS authentication costs exceed $500,000 annually before any volume discounts.</p><h3>What Is the ROI Timeline for Switching to Passwordless Authentication?</h3><p>Most enterprise implementations see positive ROI within 12 to 18 months. High-volume consumer platforms with significant SMS OTP spend or measurable conversion losses to authentication friction often see ROI within 6 to 9 months. The primary drivers of faster ROI are: high password reset volumes, significant SMS delivery spend, measurable conversion drop at registration or login, and active credential stuffing attack traffic generating infrastructure overhead.</p><h3>Does Passwordless Authentication Reduce Cyber-Insurance Premiums?</h3><p>Yes, in most cases. Underwriters increasingly treat phishing-resistant MFA, including FIDO2 passkeys, as a positive control that reduces premium risk. Organizations that can demonstrate FIDO2 deployment for privileged and customer-facing accounts typically qualify for lower risk classifications during renewal. The specific premium impact varies by underwriter and policy structure, but reductions of 15% to 30% are reported in the market for organizations that move from password-only or SMS MFA to phishing-resistant authentication.</p><h3>How Does Account Takeover Churn Affect Customer Lifetime Value Calculations?</h3><p>Account takeover incidents create two distinct churn signals: direct churn from affected customers who leave after experiencing fraud, and indirect churn from customers who hear about the incident and choose not to join or who reduce engagement. Ping Identity research found that 44% of consumers stop using a service after a security incident. For a product with a $500 average customer lifetime value, an ATO incident affecting 5,000 accounts produces a churn-related revenue loss of approximately $1.1 million from direct departures alone, before legal, remediation, or PR costs are included.</p><hr><h2>Final Thoughts</h2><p>The business case for passwordless authentication isn't really about security. It's about stopping a slow, invisible bleed across support, infrastructure, compliance, revenue, and insurance budgets that most organizations have never measured as a single number. When you do the math, passwords are almost always the most expensive authentication system available. to run these numbers against your own data and build a CFO-ready business case for going passwordless.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/13-hidden-costs-of-password-based-authentication-with-real-roi-math/" data-a2a-title="13 Hidden Costs of Password-Based Authentication (With Real ROI Math)"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2F13-hidden-costs-of-password-based-authentication-with-real-roi-math%2F&amp;linkname=13%20Hidden%20Costs%20of%20Password-Based%20Authentication%20%28With%20Real%20ROI%20Math%29" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2F13-hidden-costs-of-password-based-authentication-with-real-roi-math%2F&amp;linkname=13%20Hidden%20Costs%20of%20Password-Based%20Authentication%20%28With%20Real%20ROI%20Math%29" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2F13-hidden-costs-of-password-based-authentication-with-real-roi-math%2F&amp;linkname=13%20Hidden%20Costs%20of%20Password-Based%20Authentication%20%28With%20Real%20ROI%20Math%29" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2F13-hidden-costs-of-password-based-authentication-with-real-roi-math%2F&amp;linkname=13%20Hidden%20Costs%20of%20Password-Based%20Authentication%20%28With%20Real%20ROI%20Math%29" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2F13-hidden-costs-of-password-based-authentication-with-real-roi-math%2F&amp;linkname=13%20Hidden%20Costs%20of%20Password-Based%20Authentication%20%28With%20Real%20ROI%20Math%29" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://mojoauth.com/blog">MojoAuth Blog - Passwordless Authentication &amp;amp; Identity Solutions</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by MojoAuth Blog - Passwordless Authentication &amp; Identity Solutions">MojoAuth Blog - Passwordless Authentication &amp; Identity Solutions</a>. Read the original post at: <a href="https://mojoauth.com/blog/13-hidden-costs-of-password-based-authentication-with-real-roi-math">https://mojoauth.com/blog/13-hidden-costs-of-password-based-authentication-with-real-roi-math</a> </p>

9 Identity-Based Threats Redefining Cybersecurity in 2026 (Beyond Credential Stuffing)

  • None
  • Published date: 2026-04-25 00:00:00

None

<p>The post <a href="https://mojoauth.com/blog/9-identity-based-threats-redefining-cybersecurity-beyond-credential-stuffing">9 Identity-Based Threats Redefining Cybersecurity in 2026 (Beyond Credential Stuffing)</a> appeared first on <a href="https://mojoauth.com/blog">MojoAuth Blog – Passwordless Authentication &amp; Identity Solutions</a>.</p><p>The identity threat landscape in 2026 looks nothing like it did three years ago. Attackers are no longer just recycling breach lists. They're deploying AI-generated voices to bypass bank call centers, using autonomous AI agents to silently escalate privileges, and hoarding encrypted data today to decrypt it after quantum computers arrive. If your security architecture is still optimized for 2023's playbook, you're defending the wrong perimeter. This guide breaks down the nine identity threats that are reshaping what "secure authentication" actually means right now.</p><h2>Key Takeaways</h2><ul> <li> <p>Credential stuffing is yesterday's threat. The 2026 attack surface includes AI agents, deepfake voices, and quantum-era data harvesting.</p> </li> <li> <p>MFA fatigue attacks rose 217% year-over-year according to the 2025 Verizon DBIR, making push-notification MFA a liability in high-risk environments.</p> </li> <li> <p>Deepfake-generated audio and video can now bypass voice biometric systems used by financial institutions, with a 900% year-over-year increase in deepfake file volume reported in 2024.</p> </li> <li> <p>Legacy authentication (passwords, SMS OTP, push-based MFA) fails against most of these threats by design, not by accident.</p> </li> <li> <p>Phishing-resistant, passwordless, zero-store authentication neutralizes the majority of the attack vectors below at the identity layer.</p> </li> </ul><h2>Why the 2026 Identity Threat Matrix Is Different</h2><p>Most of the threats that dominated security conversations from 2018 to 2023 shared one dependency: the password. Credential stuffing, password spraying, brute force, even basic phishing were all, at their core, attempts to obtain or guess a shared secret that granted access.</p><p>The 2026 threat matrix has moved past that. Attackers now target the verification layer itself, not just the credentials that feed it. They're cloning voices to pass authentication challenges, training AI models to mimic writing styles for spear phishing, and exploiting the implicit trust that AI agents receive when operating inside enterprise systems. Some threats don't even require real-time access. "Harvest now, decrypt later" attacks store your encrypted data for a future in which quantum computing makes today's encryption trivial to break.</p><p>The enterprises that are already in trouble are the ones treating these as emerging risks to monitor rather than active threats to defend against. They're not emerging. They're here.</p><hr><h2>The 9 Identity Threats Your Security Architecture Needs to Address in 2026</h2><h3>1. Agentic AI Identity Hijacking</h3><p>Agentic AI systems are software that doesn't just answer questions but takes actions: browsing the web, writing and executing code, sending emails, interacting with APIs, and managing workflows on behalf of users. Enterprises are deploying these systems rapidly, and the identity and access management implications are significant.</p><p>The problem is that AI agents typically operate with the permissions of the user or service account that spawned them. If an agent is compromised or manipulated through a prompt injection attack, it can take actions with whatever access level the identity layer has granted it, often without any human review in the loop. OWASP's Agentic Applications Top 10, published in 2025, identifies excessive agency and identity confusion as top-tier risks in these deployments.</p><p>A real-world example: an attacker embeds a malicious instruction in a document that an AI assistant reads and processes. The instruction directs the agent to exfiltrate data via an API call. The agent executes it. No login event. No stolen credential. No brute force attempt. The identity layer was never directly attacked because it didn't need to be.</p><p><strong>Why legacy auth fails:</strong> Traditional authentication was designed for humans making deliberate login decisions. AI agents operate continuously, often with long-lived session tokens that don't trigger re-authentication. There's no challenge to respond to.</p><p><strong>How passwordless, zero-store auth helps:</strong> Short-lived, cryptographically bound tokens with strict scope constraints limit what a compromised agent can do.</p><hr><h3>2. Deepfake Voice Phishing Bypassing Bank Authentication</h3><p>Voice biometrics have been deployed widely by financial institutions as a "something you are" factor. The logic was sound: your voice is unique, difficult to forge, and convenient for phone-based authentication. That logic is now under severe pressure.</p><p>Deepfake audio generation has reached a point where a few seconds of publicly available audio (a YouTube video, a podcast appearance, a TikTok clip) is enough to train a voice clone convincing enough to fool voice authentication systems. Security researchers reported a 900% year-over-year increase in deepfake file volume in 2024. Attackers are using these clones in vishing (voice phishing) campaigns that target bank authentication systems, HR departments for payroll fraud, and executives for wire transfer authorization.</p><p>In 2024, a finance worker in Hong Kong was manipulated into transferring $25 million after a video call that included AI-generated deepfake versions of his company's CFO and other executives. The attack wasn't a login-screen exploit. It was an identity verification failure.</p><p><strong>Why legacy auth fails:</strong> Voice biometrics and knowledge-based authentication ("what's your mother's maiden name?") were built for an era where producing a convincing impersonation required significant skill and resources. Neither condition applies now.</p><p><strong>How passwordless, zero-store auth helps:</strong> Device-bound FIDO2 passkeys authenticate a cryptographic key tied to a specific hardware device, not a biometric sample that can be cloned from public data. See how <a href="https://mojoauth.com/blog/passwordless-authentication-options">MojoAuth's phishing-resistant authentication</a> works against deepfake-based account takeover.</p><hr><h3>3. Push-Notification MFA Fatigue Attacks</h3><p>MFA fatigue (also called MFA bombing or push spam) is not a new concept, but its scale has reached a point where it needs to be treated as a primary threat vector rather than an edge case. The 2025 Verizon Data Breach Investigations Report documented a 217% year-over-year increase in MFA fatigue attacks. Lapsus$, the threat actor group responsible for breaches at Microsoft, Okta, Nvidia, and Uber, used this technique as a primary entry method.</p><p>The attack is simple. Attackers obtain a valid username and password (from a breach list, phishing, or purchase on the dark web). They attempt to log in repeatedly, triggering a stream of push notifications to the target's authenticator app. Most users, receiving a flood of unexpected approval prompts at 2 a.m., eventually tap "Approve" just to make it stop. Uber's 2022 breach followed exactly this pattern.</p><p>The attack requires no technical sophistication. It requires only patience, a valid credential, and the statistical certainty that some percentage of users will approve a prompt they didn't initiate.</p><p><strong>Why legacy auth fails:</strong> Push-based MFA was designed to add friction against attackers who don't have valid credentials. It provides almost no protection when the attacker does have valid credentials and is using social pressure as the second factor.</p><p><strong>How passwordless, zero-store auth helps:</strong> If there's no password to submit, there's no login attempt to trigger a push notification. Passwordless flows that use biometric-bound passkeys eliminate the first factor that makes MFA fatigue possible. No credential, no prompt, no fatigue.</p><hr><h3>4. AI-Generated Spear Phishing That's Indistinguishable From Legitimate</h3><p>Traditional spear phishing required genuine human effort: research the target, write a convincing email, mimic the writing style of a trusted colleague. That work took hours per target, which naturally limited the scale of sophisticated campaigns.</p><p>AI changed the economics completely. With access to a target's LinkedIn profile, public email communications, and company announcements, an LLM can generate hundreds of highly personalized, contextually accurate phishing emails in minutes. These messages reference real projects, use correct internal terminology, and replicate writing patterns well enough to pass a human review. STAT: <a href="https://www.brside.com/blog/ai-generated-phishing-vs-human-attacks-2025-risk-analysis">AI-generated phishing success rates vs. traditional phishing</a>.</p><p>What makes this a 2026 identity threat specifically is the downstream target. AI spear phishing is no longer primarily aimed at credential theft via fake login pages. It's increasingly used to initiate business email compromise (BEC), manipulate OAuth consent flows, and extract session tokens from enterprise tools. The credential is often just the first step toward a longer-term identity persistence play.</p><p><strong>Why legacy auth fails:</strong> Email filters and user training were calibrated against phishing messages that contained detectable signals: odd formatting, generic greetings, slightly wrong sender domains. AI-generated phishing routinely passes those checks.</p><p><strong>How passwordless, zero-store auth helps:</strong> FIDO2 passkeys are origin-bound. Even if a user is deceived into visiting a convincing fake login page, the passkey will not respond because the domain doesn't match the registered origin. The phishing-resistant property is structural, not dependent on the user spotting the deception.</p><hr><h3>5. MCP Token Misuse and Model Context Protocol Exploitation</h3><p>Model Context Protocol (MCP) is a relatively new standard that allows AI models to connect to external tools, data sources, and APIs through a structured interface. It's gaining rapid adoption in enterprise AI deployments. It's also an emerging identity attack surface that most security teams haven't addressed yet.</p><p>MCP servers issue tokens that allow AI models to take actions on connected systems. If an attacker can inject malicious instructions into a data source that an MCP server reads (a document, a database entry, a web page), they can potentially manipulate the AI model into using its legitimate access tokens to take unauthorized actions. This is a form of prompt injection at the infrastructure level, and the identity implications are significant because the actions taken use valid, authorized credentials.</p><p>The threat is compounded by the fact that MCP is evolving quickly and security standards for token scope, expiry, and audit logging are not yet consistent across implementations. Security architects building AI-integrated workflows right now are largely operating without established best practice guidance on MCP access control.</p><p><strong>Why legacy auth fails:</strong> Access control frameworks designed for human users accessing defined resources don't map cleanly to AI models that dynamically discover and interact with connected services.</p><p><strong>How passwordless, zero-store auth helps:</strong> Strict token scoping, short-lived credentials, and zero-standing-privilege architectures reduce the blast radius of an MCP token compromise. how <a href="https://mojoauth.com/blog/zero-trust-otp-authentication-identity-security">MojoAuth supports zero-trust identity</a> for AI-integrated enterprise environments.</p><hr><h3>6. SIM Swapping and SMS OTP Interception</h3><p>SIM swapping has been a known threat for years, but it remains devastatingly effective in 2026 because SMS-based OTP is still widely deployed as an MFA method, especially by consumer platforms, banks, and government services.</p><p>In a SIM swap attack, the attacker contacts a mobile carrier, impersonates the target using personal information obtained from social media or data broker sites, and convinces the carrier to transfer the target's phone number to a SIM card the attacker controls. Once the number is transferred, any SMS-delivered OTP goes to the attacker. Combined with a valid username and password, this provides full account access.</p><p>The FTC received over 15,000 SIM swap complaints in the United States in 2023 alone. High-profile targets have included cryptocurrency investors (where SIM swaps have resulted in individual losses exceeding $24 million in single incidents), executives, and political figures. The social engineering used to execute these attacks is increasingly sophisticated, with attackers bribing carrier employees directly rather than relying on phone-based impersonation.</p><p><strong>Why legacy auth fails:</strong> SMS OTP was never cryptographically secure. The channel is controlled by telecommunications infrastructure that has social engineering vulnerabilities by design (customer service exists to help people who've lost access to their accounts).</p><p><strong>How passwordless, zero-store auth helps:</strong> FIDO2 authentication doesn't use the phone network at all. A passkey stored in a device's secure enclave cannot be intercepted via a SIM swap because SMS is never part of the flow.</p><hr><h3>7. Session Hijacking via Adversary-in-the-Middle Proxy Attacks</h3><p>Adversary-in-the-Middle (AitM) attacks using reverse proxy phishing kits represent a meaningful evolution beyond traditional phishing. Tools like Evilginx, Modlishka, and Muraena allow attackers to proxy a legitimate website in real time, intercepting not just credentials but session cookies issued after a successful login, including after MFA completion.</p><p>Here's how it works: the user visits what appears to be their normal login page (a convincing replica served through an attacker-controlled proxy). They enter their credentials and complete their MFA challenge. The proxy forwards everything to the real site and relays the real site's responses back to the user. The user is logged in normally and notices nothing. Meanwhile, the attacker has harvested both the credentials and the authenticated session cookie. They replay that cookie in their own browser and have full access for however long the session remains valid.</p><p>This technique was used in the 2022 Twilio breach and has since appeared in campaigns targeting Microsoft 365, Google Workspace, and major financial institutions. Standard MFA, including TOTP and push notifications, provides no protection because authentication completes successfully from the real server's perspective.</p><p><strong>Why legacy auth fails:</strong> Session cookies are the prize here, not credentials. Any authentication method that terminates at the browser level and issues a transferable session token is vulnerable to this class of attack.</p><p><strong>How passwordless, zero-store auth helps:</strong> FIDO2 passkeys are origin-bound and challenge-response based. The cryptographic challenge issued by the real server cannot be signed by a client connected to a proxy on a different domain. AitM proxies cannot intercept a response that the passkey simply won't generate for a mismatched origin.</p><hr><h3>8. Synthetic Identity Fraud at Scale</h3><p>Synthetic identity fraud is the creation of entirely fictional identities using combinations of real and fabricated personal information. A synthetic identity might use a real Social Security number (often one that belongs to a child, a recent immigrant, or a deceased person who isn't actively monitoring their credit) combined with a fabricated name, address, and date of birth.</p><p>Generative AI has dramatically accelerated the creation and deployment of synthetic identities. AI tools can generate photorealistic ID documents, produce consistent backstories, and create believable digital footprints across social media and professional networks. Synthetic identities are used to open fraudulent financial accounts, access services, and in enterprise contexts, to bypass identity verification during onboarding.</p><p>The financial services sector estimated losses to synthetic identity fraud at approximately $6 billion annually in the United States as of 2023, and that number has grown as AI tooling has become more accessible. The attack is particularly hard to detect because a synthetic identity has no real victim filing fraud reports. The fraud surfaces only when the identity defaults on obligations or triggers pattern-matching systems.</p><p><strong>Why legacy auth fails:</strong> Identity verification methods that rely on document matching, knowledge-based authentication, or credit bureau checks are all addressable by well-constructed synthetic identities. AI-generated documents can fool manual review. Fabricated SSN histories can pass credit checks if the number has no existing history.</p><p><strong>How passwordless, zero-store auth helps:</strong> Device-bound passkeys establish that a specific cryptographic key on a specific hardware device is associated with an account. This doesn't prevent a synthetic identity from being created, but it makes account takeover by a different actor much harder and creates a hardware-rooted audit trail that forensic analysis can use. Pairing passkeys with strong onboarding identity verification is the recommended approach.</p><hr><h3>9. "Harvest Now, Decrypt Later" Data Hoarding for Quantum Attacks</h3><p>This is the threat that feels most distant but may prove the most consequential. Nation-state actors are actively intercepting and storing encrypted communications and data today with the explicit intention of decrypting that data once sufficiently powerful quantum computers become available. The strategy is often called "harvest now, decrypt later" or HNDL.</p><p>The cryptographic algorithms that protect the vast majority of internet traffic today (RSA, ECC, and Diffie-Hellman key exchange) are vulnerable to Shor's algorithm running on a cryptographically relevant quantum computer (CRQC). The National Institute of Standards and Technology (NIST) finalized its first post-quantum cryptography standards in 2024 specifically because the timeline for CRQC capability is estimated at 5-15 years, close enough that data with long-term sensitivity needs to be protected now.</p><p>For identity systems specifically, the concern is authentication tokens, session keys, and private key material that is being harvested today. An authentication flow that looks secure in 2026 may retroactively become an entry point once the data can be decrypted. Government agencies, financial institutions, healthcare systems, and any organization handling data that needs to remain confidential for more than a decade should be evaluating their exposure to this threat.</p><p><strong>Why legacy auth fails:</strong> RSA and ECC-based authentication, which underpins the vast majority of current TLS and FIDO2 implementations, is quantum-vulnerable. This doesn't mean FIDO2 is broken today. It means organizations need to plan the migration to post-quantum cryptographic primitives.</p><p><strong>How post-quantum, passwordless auth helps:</strong> MojoAuth has aligned its roadmap with NIST's post-quantum cryptography standards, including CRYSTALS-Kyber for key encapsulation and CRYSTALS-Dilithium for digital signatures.</p><hr><h2>What the Pattern Across All 9 Threats Tells You</h2><p>Read through these nine attacks carefully and a common theme appears. None of them are primarily about obtaining a password. They're about bypassing, exploiting, or making irrelevant the entire verification layer that sits between an attacker and access.</p><p>Deepfakes attack the biometric verification channel. MCP token misuse attacks the trust granted to authenticated AI sessions. AitM proxies attack the session layer after authentication completes. HNDL attacks the cryptographic assumptions that authentication is built on. These are not incremental upgrades to credential stuffing. They are attacks on fundamentally different layers.</p><p>The implication for security architects is that "stronger passwords" and even "more MFA" are insufficient responses. The question is not how to make the password layer harder to crack. The question is how to make the identity layer structurally resistant to the classes of attack that don't involve cracking passwords at all.</p><p>Phishing-resistant authentication (FIDO2 passkeys, hardware security keys, device-bound credentials) removes the largest attack surfaces: the shareable secret, the interceptable OTP, the fakeable biometric. Post-quantum cryptography closes the long-term horizon risk. Zero-store architecture, where no replayable credential is stored server-side, eliminates the value of breach data entirely.</p><p>That's not a product pitch. It's an architectural description of what "secure identity" needs to mean in 2026.</p><hr><h2>Frequently Asked Questions</h2><h3>What Are the Most Dangerous Identity Threats in 2026?</h3><p>The most dangerous identity threats in 2026 are those that bypass authentication rather than break it. Adversary-in-the-Middle proxy attacks can intercept authenticated sessions even after MFA completes. Agentic AI hijacking exploits the trust granted to AI systems operating with enterprise credentials. Deepfake voice attacks bypass biometric verification used by financial institutions. "Harvest now, decrypt later" operations pose a long-term existential risk to any data encrypted with quantum-vulnerable algorithms.</p><h3>How Does MFA Fatigue Work and Why Is It So Effective?</h3><p>MFA fatigue exploits the push-notification mechanic in authenticator apps. An attacker with a valid username and password repeatedly triggers login attempts, sending a continuous stream of approval requests to the target's phone. The attack relies on the human tendency to eventually approve a prompt simply to stop the interruption, especially during off-hours. The 2025 Verizon DBIR reported a 217% year-over-year increase in this technique. The solution is to move away from push-based MFA entirely in favor of FIDO2 passkeys, which remove the credential that triggers the prompts.</p><h3>What Is "Harvest Now, Decrypt Later" and Should My Organization Care?</h3><p>HNDL refers to nation-state actors intercepting and storing currently encrypted data with plans to decrypt it once quantum computers are powerful enough to break today's public-key cryptography. NIST published its first post-quantum cryptography standards in 2024, explicitly acknowledging that data with long-term sensitivity needs post-quantum protection now. If your organization handles financial records, healthcare data, legal communications, or any information that must remain confidential for more than a decade, you should be evaluating your exposure and planning the migration to post-quantum cryptographic standards.</p><h3>How Do FIDO2 Passkeys Protect Against AitM Proxy Attacks?</h3><p>FIDO2 passkeys are origin-bound, meaning the cryptographic signing process is tied to the specific domain the passkey was registered with. When a user connects to an AitM proxy, the challenge the proxy relays comes from a mismatched origin. The passkey refuses to sign it. This makes the attack structurally impossible regardless of how convincing the proxy site looks to the user. It's an architectural protection, not a behavioral one. The user doesn't need to spot the deception; the protocol handles it.</p><h3>What Is the Difference Between a Deepfake Phishing Attack and Traditional Phishing?</h3><p>Traditional phishing uses text-based deception: fake emails, fake login pages, fake urgency. The target interacts with a static artifact. Deepfake phishing uses AI-generated audio or video to impersonate a real, trusted person in a dynamic interaction, a phone call, a video conference, or a voice authentication challenge. The $25 million Hong Kong wire transfer fraud in 2024 involved deepfake video representations of real company executives in a live call. Traditional phishing training doesn't prepare users for this because the attacker is mimicking a real person the user trusts.</p><h3>Is SMS-Based OTP Still Acceptable as a Second Factor?</h3><p>Not in high-risk environments. NIST deprecated SMS-based OTP as an authentication method in Special Publication 800-63B due to its vulnerability to SIM swapping, SS7 interception, and social engineering of carrier customer service. For consumer platforms with lower risk profiles, SMS OTP may still be a pragmatic option when combined with other controls. For any system handling financial data, healthcare records, privileged access, or enterprise identity, SMS OTP should be replaced with FIDO2 hardware-bound authentication as quickly as operationally feasible.</p><hr><h2>Final Thoughts</h2><p>The nine threats above aren't predictions. They're active attack patterns that security teams are responding to right now, in 2026. The good news is that a single architectural shift, moving from password-based and legacy MFA authentication to phishing-resistant, device-bound, zero-store identity, addresses the majority of the attack surface across all nine categories.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/9-identity-based-threats-redefining-cybersecurity-in-2026-beyond-credential-stuffing/" data-a2a-title="9 Identity-Based Threats Redefining Cybersecurity in 2026 (Beyond Credential Stuffing)"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2F9-identity-based-threats-redefining-cybersecurity-in-2026-beyond-credential-stuffing%2F&amp;linkname=9%20Identity-Based%20Threats%20Redefining%20Cybersecurity%20in%202026%20%28Beyond%20Credential%20Stuffing%29" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2F9-identity-based-threats-redefining-cybersecurity-in-2026-beyond-credential-stuffing%2F&amp;linkname=9%20Identity-Based%20Threats%20Redefining%20Cybersecurity%20in%202026%20%28Beyond%20Credential%20Stuffing%29" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2F9-identity-based-threats-redefining-cybersecurity-in-2026-beyond-credential-stuffing%2F&amp;linkname=9%20Identity-Based%20Threats%20Redefining%20Cybersecurity%20in%202026%20%28Beyond%20Credential%20Stuffing%29" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2F9-identity-based-threats-redefining-cybersecurity-in-2026-beyond-credential-stuffing%2F&amp;linkname=9%20Identity-Based%20Threats%20Redefining%20Cybersecurity%20in%202026%20%28Beyond%20Credential%20Stuffing%29" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2F9-identity-based-threats-redefining-cybersecurity-in-2026-beyond-credential-stuffing%2F&amp;linkname=9%20Identity-Based%20Threats%20Redefining%20Cybersecurity%20in%202026%20%28Beyond%20Credential%20Stuffing%29" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://mojoauth.com/blog">MojoAuth Blog - Passwordless Authentication &amp;amp; Identity Solutions</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by MojoAuth Blog - Passwordless Authentication &amp; Identity Solutions">MojoAuth Blog - Passwordless Authentication &amp; Identity Solutions</a>. Read the original post at: <a href="https://mojoauth.com/blog/9-identity-based-threats-redefining-cybersecurity-beyond-credential-stuffing">https://mojoauth.com/blog/9-identity-based-threats-redefining-cybersecurity-beyond-credential-stuffing</a> </p>

Cyber patrols, AI risk studies planned for schools, minister says

  • hurriyetdailynews.com
  • Published date: 2026-04-24 11:50:23

Education Minister Yusuf Tekin on April 24 announced the details of a comprehensive seven-tier school security reform following recent attacks, introducing an artificial intelligence–driven system designed to detect risks early and cyber patrols.

ANKARA Education Minister Yusuf Tekin on April 24 announced the details of a comprehensive seven-tier schoolsecurity reform following recent attacks, introducing an artificial intelligencedriven sys… [+1964 chars]

Seven new justice divisions formed with cold case unit revisiting 20 years of crime

  • hurriyetdailynews.com
  • Published date: 2026-04-24 09:24:32

The Justice Ministry has established seven new specialized departments, including a unit dedicated to investigating unsolved crimes, in a move aimed at strengthening institutional capacity and restoring public confidence in the judiciary.

ANKARA The Justice Ministry has established seven new specialized departments, including a unit dedicated to investigating unsolved crimes, in a move aimed at strengthening institutional capacity an… [+2349 chars]

Mythos shock: Why regulators in India, other nations are spooked by Anthropic’s new tool

  • Soumyarendra Barik, Anil Sasi
  • Published date: 2026-04-24 05:52:43

Anthropic’s Mythos AI model has triggered global cybersecurity concerns due to its advanced ability to both detect and exploit software vulnerabilities, prompting India and other nations to assess risks.

In 2019, Dario Amodei, then OpenAI’s research director, warned that the startup’s new large language model was too dangerous to release due to its potential for generating misleading content. When GP… [+6830 chars]

Randall Munroe’s XKCD ‘Rotational Gravity’

  • None
  • Published date: 2026-04-24 00:00:00

None

<p>The post <a href="https://xkcd.com/3220/">Randall Munroe’s XKCD 'Rotational Gravity'</a> appeared first on <a href="https://www.infosecurity.us/">Infosecurity.US</a>.</p><figure class=" sqs-block-image-figure intrinsic "> <p> <a class=" sqs-block-image-link " href="https://xkcd.com/3220/"></a></p> <p> <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/57c3ccb4-3adc-4c0b-8b88-20583234299e/rotational_gravity.png" data-image-dimensions="303x325" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/57c3ccb4-3adc-4c0b-8b88-20583234299e/rotational_gravity.png?format=1000w" width="303" height="325" sizes="auto, (max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload='this.classList.add("loaded")' srcset="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/57c3ccb4-3adc-4c0b-8b88-20583234299e/rotational_gravity.png?format=100w 100w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/57c3ccb4-3adc-4c0b-8b88-20583234299e/rotational_gravity.png?format=300w 300w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/57c3ccb4-3adc-4c0b-8b88-20583234299e/rotational_gravity.png?format=500w 500w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/57c3ccb4-3adc-4c0b-8b88-20583234299e/rotational_gravity.png?format=750w 750w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/57c3ccb4-3adc-4c0b-8b88-20583234299e/rotational_gravity.png?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/57c3ccb4-3adc-4c0b-8b88-20583234299e/rotational_gravity.png?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/57c3ccb4-3adc-4c0b-8b88-20583234299e/rotational_gravity.png?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs"></p> <p> <figcaption class="image-caption-wrapper"> <p class=""><strong>via the comic artistry and dry wit of Randall Munroe, creator of XKCD</strong></p> </figcaption></p></figure><p><a href="https://www.infosecurity.us/blog/2026/4/24/randall-munroes-xkcd-rotational-gravity">Permalink</a></p><p> </p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/randall-munroes-xkcd-rotational-gravity/" data-a2a-title="Randall Munroe’s XKCD ‘Rotational Gravity’"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-rotational-gravity%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Rotational%20Gravity%E2%80%99" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-rotational-gravity%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Rotational%20Gravity%E2%80%99" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-rotational-gravity%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Rotational%20Gravity%E2%80%99" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-rotational-gravity%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Rotational%20Gravity%E2%80%99" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Frandall-munroes-xkcd-rotational-gravity%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Rotational%20Gravity%E2%80%99" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.infosecurity.us/">Infosecurity.US</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Marc Handelman">Marc Handelman</a>. Read the original post at: <a href="https://xkcd.com/3220/">https://xkcd.com/3220/</a> </p>

What the Mythos-Ready Briefing Says About Credentials

  • None
  • Published date: 2026-04-24 00:00:00

None

<p>The post <a href="https://blog.gitguardian.com/what-the-mythos-ready-briefing-says-about-credentials/">What the Mythos-Ready Briefing Says About Credentials</a> appeared first on <a href="https://blog.gitguardian.com/">GitGuardian Blog – Take Control of Your Secrets Security</a>.</p><p><img decoding="async" src="https://storage.ghost.io/c/42/5d/425d266f-cf99-406e-9436-597a19bed011/content/images/2026/04/4.png" alt="What the Mythos-Ready Briefing Says About Credentials"></p><p>The<a href="https://labs.cloudsecurityalliance.org/mythos-ciso/?ref=blog.gitguardian.com"> <u>Mythos-ready briefing</u></a> landed last week, co-signed by Jen Easterly, Bruce Schneier, Heather Adkins, Rob Joyce, Chris Inglis, Phil Venables, and 60+ other CISOs from Google, Snowflake, Atlassian, and organizations like the NFL and TransUnion. Among the controls they named as critical for the AI vulnerability era were secrets rotation, non-human identity governance, early detection of compromise, and honeytoken-based deception. If you've been pushing for more budget for better secrets security, this is the document to put in front of your CISO.</p><h2 id="what-the-paper-says-about-credentials">What the paper says about credentials</h2><p>The briefing is a response to Anthropic's<a href="https://red.anthropic.com/2026/mythos-preview/?ref=blog.gitguardian.com"> <u>Claude Mythos Preview</u></a> announcement, which reported autonomous discovery of thousands of zero-days across every major operating system and browser with a 72% exploit success rate. The paper lays out 11 priority actions, a risk register, and a 90-day plan for CISOs. Credentials underpin nearly every control it calls out.</p><p>In the Key Takeaways, the authors name secrets rotation alongside segmentation, egress filtering, Zero Trust, and phishing-resistant MFA as mitigating controls that limit blast radius when exploitation occurs. The risk register tags "Unmanaged AI Agent Attack Surface" as CRITICAL, pointing to privileged agents operating outside existing control frameworks. </p><p>Priority Action 8 ("Harden Your Environment") mandates phishing-resistant MFA for all privileged accounts and locking down the dependency chain. Priority Action 9 ("Build a Deception Capability") calls for deploying canaries and honeytokens, layered with behavioral monitoring and pre-authorized containment. The executive briefing section frames early detection of compromise as a metric boards should be tracking. This briefing is a rare alignment of industry leadership putting credential security squarely on the critical-controls list.</p><h3 id="why-a-mythos-world-makes-credentials-matter-more"><strong>Why a Mythos world makes credentials matter more</strong></h3><p>There's a common misreading of the AI vulnerability story, which is that zero-days become the dominant threat and everything else fades. The paper's own Appendix A pushes back on that. The authors note that the historical collapse in time-to-exploit has not produced a proportional rise in exploitation impact, and that most consequential recent breaches came from credential abuse, social engineering, or supply chain compromise rather than zero-day exploitation.</p><p>The<a href="https://blog.gitguardian.com/verizon-dbir-2025/"> <u>2025 Verizon DBIR</u></a> backs this up. Stolen credentials remain the leading initial access vector at 22% of all breaches, and 88% for basic web application attacks. Machine identities are now involved in some stage of<a href="https://www.cyberark.com/resources/product-insights-blog/unified-security-bridging-the-gaps-with-a-defense-in-depth-approach?ref=blog.gitguardian.com"> <u>68% of IT security incidents</u></a>.</p><p>Layer Mythos-class capability on top of that, and valid credentials become the fastest way in. When zero-days are cheap, they accelerate lateral movement after initial access. They don't replace credentials as the entry point. That's how the<a href="https://cloud.google.com/blog/topics/threat-intelligence/unc5537-snowflake-data-theft-extortion?ref=blog.gitguardian.com"> <u>Snowflake breach in 2024</u></a> hit 165 organizations from credentials that had been sitting in infostealer logs, some since 2020. MFA wasn't enforced, rotation hadn't happened, and old credentials were still valid — no novel exploit needed.</p><h2 id="ai-is-accelerating-the-credential-sprawl-that-underlies-all-of-this">AI is accelerating the credential sprawl that underlies all of this</h2><p>That risk is accelerating. AI drives credential exposure on two fronts, volume and surface area. As the paper notes, higher code output with less consistent review increases the number of vulnerabilities that ship. The same velocity drives a parallel explosion in credential creation.</p><p>Our<a href="https://www.gitguardian.com/state-of-secrets-sprawl-report-2025?ref=blog.gitguardian.com"> <u>State of Secrets Sprawl 2026 report</u></a> found 29 million new hardcoded secrets exposed on public GitHub in 2025, a 34% year-over-year increase and the largest single-year jump on record. Credentials tied specifically to AI services surged 81% year-over-year.</p><p>And 28% of secrets-related incidents in our 2026 data originated entirely outside source code. They showed up in CI/CD systems like<a href="https://docs.gitguardian.com/ggshield-docs/integrations/cicd-integrations/github-actions?ref=blog.gitguardian.com"> <u>GitHub Actions and GitLab runners</u></a>, in<a href="https://blog.gitguardian.com/secrets-leaked-outside-the-codebase/"> <u>collaboration surfaces like Slack, Jira, and Confluence</u></a>, and on developer machines.</p><p>Those are now the same surfaces AI agents read, summarize, and act on as part of day-to-day workflows. The paper's "10 Questions" diagnostic asks whether organizations have disciplined control of their agentic supply chain, including MCP servers, plugins, and skills. The credential question sits directly underneath: what secrets do those systems hold, where do they live, who owns them, and how fast can they be rotated when something goes wrong?</p><p>In most enterprise environments, non-human identities already outnumber human users by a ratio of roughly<a href="https://nhimg.org/nhi-challenges?ref=blog.gitguardian.com"> <u>25-50x</u></a>. Very few organizations have an inventory of the ones they already have, let alone the ones AI agents are creating at scale.</p><h2 id="what-security-teams-actually-need">What security teams actually need</h2><p>Security teams need visibility everywhere credentials actually sprawl: repos, CI logs, container layers, tickets, chat threads. That's a solvable problem. The harder part is connecting each exposed secret to the non-human identity behind it and figuring out which services, workloads, or automations depend on it. Without that context, triage stalls, and an exposed credential gets used before anyone can act on it.</p><p>Ownership is where most of this work breaks down. When a credential is exposed, the question "who owns this?" usually doesn't have a clean answer. The developer who committed it may have left the team. Often, the service it authenticates runs in a different group's infrastructure entirely. The rotation path may cross three systems that were never designed to coordinate with each other. In practice, that means the incident sits in a queue while three teams figure out whether it's theirs. Every hour in that queue is an hour the credential is live and usable. That's the exposure window.</p><p>Non-human identities compound the problem. A service account created for a CI pipeline two years ago may have no human owner on record. No one's inbox to land in, no runbook to follow.</p><p>Most security programs already struggle to detect exposed credentials. They don’t even touch ownership and response, which is the gap GitGuardian was built to close.<a href="https://www.gitguardian.com/monitor-internal-repositories-for-secrets?ref=blog.gitguardian.com"> <u>GitGuardian gives teams continuous secrets detection</u></a> across source code and other places where secrets appear. That includes CI/CD systems like GitHub Actions and GitLab task runners, collaboration platforms like Slack and Jira, and developer environments down to the laptop. It surfaces exposed credentials where modern work actually happens, not just where security teams wish it did. From there,<a href="https://www.gitguardian.com/nhi-governance?ref=blog.gitguardian.com"> <u>NHI discovery and ownership mapping</u></a> connect exposed secrets to the service accounts, API keys, and machine identities that power agentic systems and automation at scale.</p><h2 id="a-case-for-moving-credential-hygiene-up-the-priority-list">A case for moving credential hygiene up the priority list</h2><p>Containment is the whole game once time-to-exploit collapses to hours. You can't afford to find credential exposure days or weeks after the fact. A secret sitting in Slack or a build log doesn't show up in a vulnerability scan. An API key tied to an agent workflow still expands the attack surface. A service credential without an owner still slows every remediation step that follows.</p><p>The paper draws a clear line through its 11 priority actions. With exploitation becoming both faster and more automated, response speed and blast-radius reduction move to the center. Secrets rotation, non-human identity governance, phishing-resistant MFA, and honeytoken-based detection belong at the front of the list as core resilience controls. They shape how quickly an organization can contain misuse once an attacker gets in, or once an agentic workflow is abused.</p><p>Given what the data shows, those controls deserve to be on the 45-day track alongside environment hardening, not grouped underneath it. In our longitudinal dataset, <a href="https://www.gitguardian.com/whitepapers/non-human-identity-whitepaper?ref=blog.gitguardian.com"><u>64% of secrets leaked in 2022</u></a> still hadn't been revoked as of 2026. The paper warns that time-to-exploit has collapsed to hours. Those two numbers don't coexist safely in the same environment.</p><p>GitGuardian directly supports that shift. Secrets detection helps teams find exposed credentials before attackers do. Rotation signals and remediation workflows push incidents toward closure instead of letting them linger. </p><p>NHI discovery and control help organizations understand which machine identities exist, what they can access, and who's responsible for them.<a href="https://www.gitguardian.com/honeytoken?ref=blog.gitguardian.com"> <u>GitGuardian Honeytokens</u></a> add an early warning layer that surfaces credential misuse before a broader incident unfolds. That maps directly to Priority Action 9 in the paper, which calls for honeytoken deployment, behavioral monitoring, and pre-authorized containment. The goal is a response that executes at machine speed.</p><p>If you're building your 90-day plan from the Mythos briefing, credential security deserves to move up the list. Hardening, detection, and response all come down to the same question: when something moves, how fast can you contain it? The organizations that come through this well will be the ones that had that answer before they needed it. Our 2026 State of Secrets Sprawl report has the full picture.</p><p><a href="https://www.gitguardian.com/state-of-secrets-sprawl-report-2026?ref=blog.gitguardian.com" rel="noreferrer"><strong><u>Read the 2026 report</u></strong></a></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/what-the-mythos-ready-briefing-says-about-credentials/" data-a2a-title="What the Mythos-Ready Briefing Says About Credentials"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhat-the-mythos-ready-briefing-says-about-credentials%2F&amp;linkname=What%20the%20Mythos-Ready%20Briefing%20Says%20About%20Credentials" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhat-the-mythos-ready-briefing-says-about-credentials%2F&amp;linkname=What%20the%20Mythos-Ready%20Briefing%20Says%20About%20Credentials" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhat-the-mythos-ready-briefing-says-about-credentials%2F&amp;linkname=What%20the%20Mythos-Ready%20Briefing%20Says%20About%20Credentials" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhat-the-mythos-ready-briefing-says-about-credentials%2F&amp;linkname=What%20the%20Mythos-Ready%20Briefing%20Says%20About%20Credentials" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhat-the-mythos-ready-briefing-says-about-credentials%2F&amp;linkname=What%20the%20Mythos-Ready%20Briefing%20Says%20About%20Credentials" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://blog.gitguardian.com/">GitGuardian Blog - Take Control of Your Secrets Security</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Ben MartinMooney">Ben MartinMooney</a>. Read the original post at: <a href="https://blog.gitguardian.com/what-the-mythos-ready-briefing-says-about-credentials/">https://blog.gitguardian.com/what-the-mythos-ready-briefing-says-about-credentials/</a> </p>

Why AI Agents Need Least Privilege Too, and How to Enforce It Automatically

  • None
  • Published date: 2026-04-24 00:00:00

None

<p>The post <a href="https://sonraisecurity.com/blog/why-ai-agents-need-least-privilege-too-and-how-to-enforce-it-automatically/">Why AI Agents Need Least Privilege Too, and How to Enforce It Automatically</a> appeared first on <a href="https://sonraisecurity.com/">Sonrai | Enterprise Cloud Security Platform</a>.</p><p>AI agents are cloud identities. They don’t get a badge or a login. They get a service account, an IAM role, or an API key, just like any other non-human identity running in your environment. Mechanically, there’s nothing new.</p><p>What’s new is how many of them are being deployed, how fast, and with how much access. Most AI agents are running with far more permissions than their work requires. Sonrai computed <a href="https://sonraisecurity.com/cloud-access-data-report/">92% of cloud identities</a> are overprivileged and the proliferation of agents only further exacerbates that. When an agent is compromised or behaves outside of scope, overprivileged access turns a small incident into a serious breach.</p><p>Below we cover why <a href="https://sonraisecurity.com/blog/theres-a-new-way-to-do-least-privilege/">least privilege</a> applies to AI agents, and how to enforce it without manual work.</p><h2 class="wp-block-heading"><strong>Why Identity Risk Exists at Scale in Cloud Environments</strong></h2><p>Cloud environments aren’t built around a small number of controlled identities. They contain thousands of human and non-human identities, each with hundreds or thousands of permissions attached.</p><p>Those permissions are typically:</p><ul class="wp-block-list"> <li>Granted upfront during deployment</li> <li>Based on templates or convenience</li> <li>Rarely reviewed or removed later</li> </ul><p>Over time, the result is predictable:</p><ul class="wp-block-list"> <li>Most permissions go unused</li> <li>No one has full visibility</li> <li>Reducing access becomes risky, because one wrong permission change on a running workload can cause an outage</li> </ul><p>AI agents are being added into this already complex environment. They inherit the same overpermissioned patterns.</p><h2 class="wp-block-heading"><strong>What Makes AI Agent Identities Different</strong></h2><p>AI agents are assigned cloud IAM identities to call APIs, access storage, and trigger actions. They often inherit broad permissions at setup, and those permissions are rarely scoped down later.</p><p>Unlike human users, agents operate continuously and at high speed without human review between actions. A single compromised or malfunctioning agent with excessive permissions can affect multiple resources across an environment before anyone notices.</p><h2 class="wp-block-heading"><strong>Why Traditional IAM Approaches Fall Short</strong></h2><p>Standard IAM reviews were built around human users and scheduled audit cycles. AI agents can be spun up in minutes, and permissions reviews lag far behind deployment.</p><p>CIEM and visibility tools surface the problem but leave remediation to manual ticket queues. By the time a ticket is resolved, the risk has already existed for weeks or months.</p><p>The problem isn’t awareness – it’s enforcement.</p><h2 class="wp-block-heading"><strong>What Overprivileged AI Agents Enable</strong></h2><p>When an <a href="https://sonraisecurity.com/blog/aws-agentcore-privilege-escalation-bedrock-scp-fix/">AI agent is overprivileged,</a> the potential impact expands far and wide.. Depending on its access, an agent can:</p><ul class="wp-block-list"> <li>Read or exfiltrate sensitive data</li> <li>Modify or delete resources</li> <li>Move laterally across accounts</li> <li>Escalate privileges or trigger downstream systems</li> </ul><p>Speed and autonomy amplify every one of these. An agent executes in seconds. By the time anyone notices, the actions are done. These actions aren’t always done maliciously. A well-intended employee may use an agent to complete a task (e.g. reduce cloud costs) and the agent finds an imaginative way to do so that wasn’t ever intended (e.g. delete data storage)</p><h2 class="wp-block-heading"><strong>Why Least Privilege Is the Right Control for AI Agents</strong></h2><p>Least privilege means each identity, including AI agents, holds only the permissions it actively uses. If an agent does not have permission to delete or exfiltrate, it cannot cause that class of damage. It doesn’t matter how it was prompted, jailbroken, or exploited. The action isn’t available to it.</p><p>This is more reliable than trying to interpret or predict agent intent at runtime. You can’t reasonably anticipate every way an agent might be manipulated or misused. You can constrain the set of actions it’s capable of taking. If the agent can’t do unauthorized things, the sophistication of the attack doesn’t matter.</p><p>This is the same principle applied to human and non-human identities. It applies equally to AI agents.</p><h2 class="wp-block-heading"><strong>How Sonrai Enforces Least Privilege for AI Agent Identities</strong></h2><p>Sonrai’s <a href="https://sonraisecurity.com/cloud-security-platform/cloud-permissions-firewall/">Cloud Permissions Firewall</a> identifies all identities in the cloud environment, including AI agent identities. It maps which permissions each agent actually uses and flags unused privileged permissions for removal.</p><p>Here’s what enforcement looks like in practice:</p><ul class="wp-block-list"> <li><strong>One-click org-level controls.</strong> Org-level cloud-native controls are deployed to block unused permissions across all accounts at once.</li> <li><strong>Permissions on Demand.</strong> If an agent needs a permission for a specific task, the JIT request is made through Slack or Teams, approved, and granted in seconds. Access is revoked when the task ends.</li> <li><strong>No extra infrastructure.</strong> Controls are enforced using native AWS, GCP and Azure capabilities. Nothing is installed in the data path.</li> </ul><p>Customers reach enforced least privilege in hours, not quarters. DevOps keeps moving. Default-deny stays in place as you add new identities.</p><div class="wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex"> <div class="wp-block-button"><a class="wp-block-button__link wp-element-button" href="https://sonraisecurity.com/cloud-permissions-firewall-roi/">See How Cloud Permissions Firewall Gets You to Least Privilege Faster</a></div> </div><h2 class="wp-block-heading"><strong>What “Accepted State” Means for AI Agents</strong></h2><p>Accepted State is the defined boundary of permissions an identity is allowed to hold. For AI agents, this means locking permissions to what the agent needs for its actual workload.</p><p>Permissions outside the Accepted State are blocked at the policy layer, not just flagged in a report. When an agent’s scope legitimately changes, the Accepted State is updated through a governed, auditable process instead of quietly expanded by whoever has console access.</p><h2 class="wp-block-heading"><strong>Conclusion</strong></h2><p>AI agents are cloud identities, and they carry the same access risk as any other overprivileged identity in your environment, amplified by speed and autonomy.</p><p>Least privilege is not a new concept being applied to AI. It’s the same standard that should govern every identity. The gap is enforcement, not awareness. Sonrai closes that gap by automating policy deployment at the org level, using native cloud controls, making least privilege actually achievable – without disrupting running workloads.</p><h2 class="wp-block-heading"><strong>Frequently Asked Questions</strong></h2><h3 class="wp-block-heading"><strong>Do AI agents need separate IAM identities or can they share roles?</strong></h3><p>In a perfect world, every agent would have its own identity — that gives you clean attribution during incidents and contains the blast radius of any single compromise. But functionally, that’s rarely realistic at scale. The more practical focus is hardening the permissions attached to the roles agents actually share. Scope each role tightly to the specific actions and resources its workloads genuinely need, enforce short-lived credentials, and invest in logging that captures enough context to reconstruct attribution even when the IAM identity isn’t unique. </p><h3 class="wp-block-heading"><strong>What is “Accepted State” in the context of AI agent permissions?</strong></h3><p>Accepted State is the defined permissions boundary for a given identity. For an AI agent, it’s the set of permissions the agent actually needs to perform its workload. Anything outside that boundary is blocked by policy, not just flagged as a risk. When the agent’s scope changes, the Accepted State is updated through a controlled process.</p><h3 class="wp-block-heading"><strong>How does Sonrai handle AI agents that need temporary elevated access?</strong></h3><p>Through Privileges-on-Demand. Privileged permissions are blocked by default. When an agent or its owner needs elevated access for a specific task, a Just-in-Time access request can be requested or automated via Slack, Teams, or an existing ticketing workflow. Access is granted for the duration of the task and revoked automatically when it ends. The exploitation window for a compromised credential shrinks from indefinite to near-zero.</p><h3 class="wp-block-heading"><strong>Does enforcing least privilege for AI agents break their workflows?</strong></h3><p>Not if it’s based on actual usage. Sonrai analyzes what each agent is currently using before anything is blocked. What gets restricted is unused access, permissions that were granted but never exercised. Removing those doesn’t affect the agent’s ability to do its job. For permissions an agent occasionally needs, Privileges-on-Demand provides a controlled path without making them standing privileges.</p><h3 class="wp-block-heading"><strong>How is AI agent identity security different from non-human identity (NHI) security?</strong></h3><p>Mechanically, it isn’t. An agent authenticates and acts through the same IAM primitives as any other NHI. What’s different is behavior. Agents make decisions in context and can take a wider range of actions than a static automation script. That’s exactly why enforcement at the permissions layer matters more for agents. You can’t reliably predict every action an agent might take, but you can constrain the set of actions it’s capable of taking.</p><h3 class="wp-block-heading"><strong>What cloud environments does Sonrai support for AI agent identity enforcement?</strong></h3><p>Sonrai’s Cloud Permissions Firewall enforces controls natively in AWS, GCP and Azure using the providers’ own policy mechanisms, including AWS Service Control Policies at the org level. Nothing is installed in the data path, so there’s no added latency and no new infrastructure to manage.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/why-ai-agents-need-least-privilege-too-and-how-to-enforce-it-automatically/" data-a2a-title="Why AI Agents Need Least Privilege Too, and How to Enforce It Automatically"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhy-ai-agents-need-least-privilege-too-and-how-to-enforce-it-automatically%2F&amp;linkname=Why%20AI%20Agents%20Need%20Least%20Privilege%20Too%2C%20and%20How%20to%20Enforce%20It%20Automatically" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhy-ai-agents-need-least-privilege-too-and-how-to-enforce-it-automatically%2F&amp;linkname=Why%20AI%20Agents%20Need%20Least%20Privilege%20Too%2C%20and%20How%20to%20Enforce%20It%20Automatically" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhy-ai-agents-need-least-privilege-too-and-how-to-enforce-it-automatically%2F&amp;linkname=Why%20AI%20Agents%20Need%20Least%20Privilege%20Too%2C%20and%20How%20to%20Enforce%20It%20Automatically" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhy-ai-agents-need-least-privilege-too-and-how-to-enforce-it-automatically%2F&amp;linkname=Why%20AI%20Agents%20Need%20Least%20Privilege%20Too%2C%20and%20How%20to%20Enforce%20It%20Automatically" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhy-ai-agents-need-least-privilege-too-and-how-to-enforce-it-automatically%2F&amp;linkname=Why%20AI%20Agents%20Need%20Least%20Privilege%20Too%2C%20and%20How%20to%20Enforce%20It%20Automatically" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://sonraisecurity.com/">Sonrai | Enterprise Cloud Security Platform</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Tally Shea">Tally Shea</a>. Read the original post at: <a href="https://sonraisecurity.com/blog/why-ai-agents-need-least-privilege-too-and-how-to-enforce-it-automatically/">https://sonraisecurity.com/blog/why-ai-agents-need-least-privilege-too-and-how-to-enforce-it-automatically/</a> </p>

How AI and Power BI Are Transforming Commercial & Residential Property Insurance

  • None
  • Published date: 2026-04-24 00:00:00

None

<p>Property insurance is not a data problem. It is a decision problem.</p><p>Insurers already sit on massive volumes of data: claims histories, property records, geospatial inputs, weather patterns, inspection reports. Yet pricing is still inconsistent, underwriting is still subjective, and claims are still processed too slowly.</p><p>The gap is obvious. Data exists. Intelligence does not.</p><p><strong>Every day, insurers make high-stakes financial decisions with incomplete visibility:</strong></p><ul> <li>Pricing risks they do not fully understand</li> <li>Carrying exposure they cannot see</li> <li>Paying claims they should have flagged</li> <li>Losing profitable customers without knowing why</li> </ul><p>This is not a technology limitation. It is an execution failure.</p><p>AI and Power BI change the <a href="https://www.ishir.com/blog/320185/ai-native-enterprise-transformation-from-experimentation-to-scalable-impact-in-2026.htm">operating model</a>. They shift insurance from reactive reporting to real-time decision intelligence. From hindsight to foresight. From fragmented data to unified risk visibility.</p><p>The insurers winning today are not the ones with more data. They are the ones making faster, more accurate decisions with it.</p><h2>Property Insurance Data Fragmentation: Why Insurers Fail to Turn Data into Decisions</h2><p>Property insurers are not short on data. They already manage vast volumes of policy records, claims history, inspection reports, geospatial inputs, and external risk data. The real issue is not availability, it is usability.</p><p>Most of this data sits across disconnected systems, <a href="https://www.ishir.com/legacy-application-modernization-gen-ai.htm">legacy platform</a>s, and manual spreadsheets. It is not integrated, not real-time, and not structured for decision-making. By the time it reaches key stakeholders, it is outdated and missing context.</p><p>This creates a visibility gap across underwriting, claims, and portfolio risk. Decisions are made with incomplete information, leading to mispriced risk, slow claims handling, and hidden exposure. Data exists, but actionable intelligence does not.</p><p><strong>Key Industry Statistics</strong></p><ul> <li><strong>$80 billion+</strong> annual insured property losses from weather events (US, 2023).</li> <li><strong>18–24%</strong> of property claims involve some element of fraud or misrepresentation.</li> <li><strong>47 days</strong> average residential property claim cycle time without <a href="https://www.ishir.com/blog/308863/ai-has-changed-the-cost-of-experimentation.htm">AI-assisted processing</a>.</li> <li><strong>62%</strong> of underwriters still rely primarily on spreadsheets for risk analysis.</li> </ul><h2><strong>Property Insurance Pain Points: Key Operational Gaps Driving Loss Ratios and Revenue Leakage</strong></h2><ul> <li><strong>Mispriced Risk and Inaccurate Underwriting</strong><br> High-risk properties are consistently underpriced due to incomplete risk visibility and lack of predictive analytics. Insurers only recognize pricing gaps after loss ratios increase, directly impacting profitability and combined ratio performance.</li> <li><strong>Unseen Portfolio Concentration Risk</strong><br> Exposure builds across high-risk zones such as flood plains and wildfire regions without real-time monitoring. Without portfolio-level analytics, insurers accumulate correlated risks that amplify losses during catastrophic events.</li> <li><strong>Inefficient Claims Triage and Processing Delays</strong><br> Claims teams are overwhelmed during high-volume events, with no intelligent prioritization. High-severity claims are delayed, increasing cycle time, customer dissatisfaction, and operational costs.</li> <li><strong>Delayed and Ineffective Fraud Detection</strong><br> Fraud detection systems rely on manual reviews and rule-based triggers, identifying issues after payouts are made. Complex fraud patterns across claims, brokers, and timelines remain undetected, increasing financial leakage.</li> <li><strong>Inconsistent Underwriting Decisions</strong><br> Risk evaluation varies across underwriters due to lack of standardized, <a href="https://www.ishir.com/blog/319765/how-to-prioritize-product-strategy-features-using-data-instead-of-opinions.htm">data-driven scoring models</a>. This inconsistency leads to pricing errors, uneven risk selection, and reduced underwriting efficiency.</li> <li><strong>Customer Retention and Renewal Leakage</strong><br> Profitable policyholders are not proactively identified or retained due to lack of predictive churn analytics. Insurers lose high-value customers while retaining deteriorating risks, weakening overall portfolio quality.</li> </ul><h2>Why Traditional BI in Insurance Fails: Limits of Descriptive Analytics in Property Risk Management</h2><h4><strong>1. Backward-Looking Analytics with No Predictive Power</strong></h4><p>Traditional BI dashboards focus on historical metrics such as loss ratios, premiums, and claims volume. They explain what already happened but provide no insight into future risk, emerging losses, or portfolio performance trends.</p><h4><strong>2. Inability to Model Complex Risk Variables</strong></h4><p><a href="https://www.ishir.com/insurtech-insurance-technology-services.htm">Property insurance</a> risk depends on multiple dynamic factors such as location, climate patterns, construction type, and exposure concentration. Traditional BI tools cannot process non-linear relationships or multi-variable risk interactions at scale.</p><h4><strong>3. No Integration of Real-Time and External Data</strong></h4><p>Modern risk assessment requires inputs like weather data, geospatial intelligence, and satellite imagery. <a href="https://www.ishir.com/blog/47678/legacy-system-modernization-6-undeniable-reasons-why-you-need-to-upgrade-it-more-than-ever.htm">Legacy BI systems</a> are not designed to ingest or process these data sources, limiting visibility into evolving risk conditions.</p><h4><strong>4. Weak Fraud Detection and Pattern Recognition</strong></h4><p>Rule-based reporting fails to detect anomalies across large datasets. Traditional BI cannot identify hidden fraud patterns across claims, brokers, and timelines, resulting in delayed detection and increased financial loss.</p><h4><strong>5. Lack of Actionable Decision Intelligence</strong></h4><p>Descriptive analytics highlights trends but does not provide recommendations or explain risk drivers. Insurers need predictive and prescriptive insights that identify high-risk policies, forecast losses, and guide underwriting and claims decisions in real time.</p><h2>AI and Power BI Architecture for Property Insurance: From Data Integration to Real-Time Decision Intelligence</h2><h4><strong>1. Unified Insurance Data Sources for Complete Risk Visibility</strong></h4><p>This layer consolidates all internal and external data required for property insurance analytics. It includes policy systems, claims platforms, broker data, geospatial inputs, weather feeds, and third-party property intelligence.</p><h4><strong>2. Scalable Azure Data Platform for Data Integration and Real-Time Processing</strong></h4><p>Azure services such as Data Factory, Synapse Analytics, and Data Lake enable data ingestion, transformation, and storage at scale. Real-time pipelines using Event Hubs ensure continuous data flow from multiple sources.</p><h4><strong>3. AI and Machine Learning Models for Predictive Insurance Analytics</strong></h4><p>AI models process large-scale insurance data to generate predictive and prescriptive insights. These include risk scoring, fraud detection, claims severity prediction, catastrophe loss modeling, and customer churn analysis.</p><h4><strong>4. Power BI as the Decision Intelligence Layer for Insurance Teams</strong></h4><p>Power BI delivers AI-driven insights through role-based dashboards for underwriters, claims teams, and executives. It centralizes all outputs into a single interface for faster and more consistent decision-making.</p><h2>High-Impact Use Cases That Drive ROI</h2><h4><strong>1. AI-Powered Underwriting</strong></h4><p><strong>Problem:</strong> Risk assessment is slow and subjective.<br> <strong>Solution:</strong> AI risk scoring + Power BI dashboards.</p><p><strong>What you get:</strong></p><ul> <li>Real-time risk scores</li> <li>Key risk drivers explained clearly</li> <li>Comparable property insights</li> <li>Suggested pricing</li> </ul><p><strong>Result:</strong> Faster quotes, consistent underwriting, better risk selection.</p><h4><strong>2. Smart Claims Triage</strong></h4><p><strong>Problem:</strong> Claims are processed in the wrong order.<br> <strong>Solution:</strong> AI ranks claims by severity.</p><p><strong>What you get:</strong></p><ul> <li>Priority-based claim queues</li> <li>Real-time damage estimation</li> <li>Fraud flags at intake</li> </ul><p><strong>Result:</strong> Faster settlements, better customer experience, lower costs.</p><h4><strong>3. Portfolio Risk Visibility</strong></h4><p><strong>Problem:</strong> You don’t see concentration risk until it’s too late.<br> <strong>Solution:</strong> AI-driven exposure modeling.</p><p><strong>What you get:</strong></p><ul> <li>Real-time portfolio heatmaps</li> <li>Risk accumulation alerts</li> <li>Scenario simulations</li> </ul><p><strong>Result:</strong> Better capital protection and smarter underwriting limits.</p><h4><strong>4. Fraud Detection That Works</strong></h4><p><strong>Problem:</strong> Fraud slips through rule-based systems.<br> <strong>Solution:</strong> AI anomaly detection + network analysis.</p><p><strong>What you get:</strong></p><ul> <li>Fraud probability scoring</li> <li>Hidden connections between claims</li> <li>Investigation-ready insights</li> </ul><p><strong>Result:</strong> Stop fraud before payout. Reduce loss leakage.</p><h4><strong>5. Renewal Optimization</strong></h4><p><strong>Problem:</strong> You either overprice and lose customers or underprice and lose money.<br> <strong>Solution:</strong> AI-driven pricing + churn prediction.</p><p><strong>What you get:</strong></p><ul> <li>Price sensitivity insights</li> <li>Retention risk scoring</li> <li>Optimized renewal pricing</li> </ul><p><strong>Result:</strong> Higher retention of profitable customers.</p><h4><strong>6. Climate Risk Modeling</strong></h4><p><strong>Problem:</strong> Traditional risk models are outdated.<br> <strong>Solution:</strong> AI integrates climate and geospatial data.</p><p><strong>What you get:</strong></p><ul> <li>Future risk projections</li> <li>Property-level climate scores</li> <li>ESG-ready reporting</li> </ul><p><strong>Result:</strong> Better long-term underwriting decisions.</p><h4><strong>7. Loss Control Intelligence</strong></h4><p><strong>Problem:</strong> Risk changes after policy issuance go unnoticed.<br> <strong>Solution:</strong> Continuous monitoring with AI.</p><p><strong>What you get:</strong></p><ul> <li>Mid-term risk alerts</li> <li>Property condition tracking</li> <li>Re-inspection prioritization</li> </ul><p><strong>Result:</strong> Fewer large losses.</p><h4><strong>8. Executive Decision Intelligence</strong></h4><p><strong>Problem:</strong> Reporting is slow and backward-looking.<br> <strong>Solution:</strong> AI-powered Power BI dashboards.</p><p><strong>What you get:</strong></p><ul> <li>Real-time KPIs</li> <li>Predictive loss ratios</li> <li>Automated reports</li> </ul><p><strong>Result:</strong> Faster, better decisions at leadership level.</p><h2>Why AI and Power BI Deliver High ROI in Property Insurance: Data, Risk Modeling, and Decision Intelligence Advantage</h2><h4><strong>1. Insurance Data is Structured, Deep, and AI-Ready</strong></h4><p>Property insurance operates on decades of structured policy and claims data, making it ideal for machine learning and predictive analytics. This rich data foundation enables high-accuracy risk modeling, fraud detection, and underwriting optimization.</p><h4><strong>2. Every Insurance Decision Has Direct Financial Impact</strong></h4><p>Underwriting, claims processing, and pricing decisions directly affect loss ratios, combined ratios, and profitability. This makes it easy to measure the ROI of AI and Power BI through tangible metrics such as reduced loss leakage and improved pricing accuracy.</p><h4><strong>3. AI Solves Complex, Multi-Variable Risk Modeling</strong></h4><p>Property risk depends on multiple interconnected factors including location, construction, climate exposure, and historical loss patterns. AI models handle non-linear relationships and large-scale data interactions that traditional actuarial models cannot process efficiently.</p><h4><strong>4. Speed Improves Profitability and Customer Retention</strong></h4><p>Faster underwriting decisions, real-time claims triage, and early fraud detection directly improve operational efficiency. Speed reduces claim cycle time, enhances customer experience, and strengthens competitive positioning in the insurance market.</p><h4><strong>5. Regulatory Compliance and Reporting Made Scalable</strong></h4><p>Insurance regulations such as IFRS 17, Solvency II, and climate risk disclosures require continuous reporting and transparency. <a href="https://www.ishir.com/artificial-intelligence.htm">AI-powered automation</a> in Power BI simplifies compliance, reduces manual effort, and ensures accurate, audit-ready reporting.</p><h4><strong>6. Power BI Enables Role-Based Decision Intelligence Across Teams</strong></h4><p>Power BI delivers tailored insights to underwriters, claims teams, actuaries, and executives through a unified platform. This ensures consistent decision-making, improves collaboration, and democratizes access to real-time insurance analytics across the organization.</p><h2>How to Implement AI in Property Insurance: A Practical Roadmap for Measurable ROI</h2><h4><strong>Phase 1: Data Foundation</strong></h4><ul> <li>Integrate policy and claims data</li> <li>Build a unified data model</li> <li><a href="https://www.ishir.com/blog/310482/can-your-ai-initiative-count-on-your-data-strategy-and-governance.htm">Clean and standardize data</a></li> </ul><h4><strong>Phase 2: Start with Fraud Detection</strong></h4><ul> <li>Fast ROI</li> <li>Uses existing data</li> <li>Easy to measure impact</li> </ul><h4><strong>Phase 3: Underwriting Intelligence</strong></h4><ul> <li>Add external data sources</li> <li>Deploy risk scoring models</li> </ul><h4><strong>Phase 4: Full Intelligence Layer</strong></h4><ul> <li>Portfolio analytics</li> <li>CAT response</li> <li>Executive dashboards</li> </ul><h2>How ISHIR Helps Property Insurers Accelerate AI and Data-Driven Transformation</h2><p>ISHIR combines deep expertise in <a href="https://www.ishir.com/data-analytics.htm">data analytics</a>, AI accelerators, and insurance-focused data engineering to help insurers move from fragmented systems to unified decision intelligence. <a href="https://www.ishir.com/data-ai-acceleration.htm">Our Data + AI Accelerator</a> framework fast-tracks implementation by integrating policy, claims, and external data into scalable Azure-based architectures, enabling real-time analytics and predictive modeling. This reduces time-to-value and ensures insurers start seeing measurable outcomes early in the journey.</p><p>We extend this with advanced analytics and <a href="https://www.ishir.com/generative-ai-solutions.htm">Generative AI</a> solutions, including risk modeling, fraud detection, and intelligent automation using Copilot and Azure OpenAI. Our approach embeds AI directly into business workflows through Power BI, enabling underwriters, claims teams, and executives to act on insights instantly. The result is a fully operational, AI-driven insurance ecosystem that improves underwriting accuracy, reduces loss leakage, and drives sustained competitive advantage.</p><div class="ctaThreeWrapper"> <div class="ctaThreeContent"> <div class="ctaThreeConList"> <div class="content"> <h2 data-start="0" data-end="101"><strong>Struggling with fragmented data, slow underwriting decisions, and rising loss ratios?</strong></h2> <p>ISHIR helps you unify data, deploy AI-driven analytics, and enable real-time decision intelligence with Power BI.</p> <div class="linkWrapper"><a href="https://www.ishir.com/get-in-touch.htm" rel="noopener">Get Started</a></div> </div> </div> </div> </div><h2>FAQs</h2><h4><strong>Q. How is AI used in property insurance underwriting and risk assessment?</strong></h4><p>AI in property insurance underwriting uses machine learning models to analyze large datasets such as property attributes, claims history, geospatial data, and weather patterns. It enables insurers to generate real-time risk scores, identify high-risk properties, and improve pricing accuracy. Unlike traditional underwriting, AI handles multi-variable risk modeling and provides explainable insights. This results in faster decision-making, reduced adverse selection, and improved combined ratios.</p><h4><strong>Q. What are the benefits of using Power BI in insurance analytics?</strong></h4><p>Power BI in insurance provides centralized dashboards for claims, underwriting, and portfolio performance, enabling real-time visibility into key metrics like loss ratios and risk exposure. It integrates data from multiple systems and presents it in an actionable format for different roles. When combined with AI, Power BI transforms from a reporting tool into a decision intelligence platform. This improves operational efficiency, reduces manual reporting, and accelerates business decisions.</p><h4><strong>Q. How does AI improve fraud detection in property insurance claims?</strong></h4><p>AI-driven fraud detection uses anomaly detection, machine learning, and network analysis to identify suspicious claims patterns across large datasets. It detects hidden relationships between claimants, contractors, and brokers that rule-based systems miss. AI can flag high-risk claims at the submission stage, reducing fraudulent payouts before they occur. This significantly lowers loss leakage and improves claims integrity.</p><h4><strong>Q. Why do traditional BI tools fail in property insurance analytics?</strong></h4><p>Traditional BI tools focus on historical reporting and lack predictive capabilities needed for insurance risk management. They cannot process unstructured data like images or claims notes, nor can they model complex risk relationships across multiple variables. As a result, insurers rely on outdated insights and reactive decision-making. AI-powered analytics fills this gap by providing forward-looking insights and actionable recommendations.</p><h4><strong>Q. How can insurers use AI and Power BI for real-time claims management?</strong></h4><p>AI and Power BI enable real-time claims triage by prioritizing claims based on severity, risk, and potential fraud. AI models analyze incoming claims data, images, and notes to estimate damage and assign priority levels. Power BI dashboards then display these insights to claims teams in real time. This reduces claim cycle time, improves customer satisfaction, and optimizes resource allocation.</p><h4><strong>Q. What challenges do insurers face when implementing AI and data analytics?</strong></h4><p>Common challenges include fragmented data systems, poor data quality, lack of integration between platforms, and limited internal AI expertise. Legacy infrastructure often prevents real-time data processing and advanced analytics. Additionally, regulatory compliance and model explainability requirements add complexity. A structured data strategy and phased AI implementation approach are critical to overcoming these barriers.</p><h4><strong>Q. How does AI help in predicting property insurance losses and catastrophe risk?</strong></h4><p>AI models use historical claims data, weather patterns, geospatial data, and climate projections to predict future losses and catastrophe exposure. These models simulate different risk scenarios and estimate probable maximum loss for portfolios. This helps insurers manage concentration risk, optimize reinsurance strategies, and improve capital planning. It also enables proactive risk mitigation before events occur.</p><p>The post <a href="https://www.ishir.com/blog/321023/how-ai-and-power-bi-are-transforming-commercial-residential-property-insurance.htm">How AI and Power BI Are Transforming Commercial &amp; Residential Property Insurance</a> appeared first on <a href="https://www.ishir.com/">ISHIR | Custom AI Software Development Dallas Fort-Worth Texas</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/how-ai-and-power-bi-are-transforming-commercial-residential-property-insurance/" data-a2a-title="How AI and Power BI Are Transforming Commercial &amp; Residential Property Insurance"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-ai-and-power-bi-are-transforming-commercial-residential-property-insurance%2F&amp;linkname=How%20AI%20and%20Power%20BI%20Are%20Transforming%20Commercial%20%26%20Residential%20Property%20Insurance" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-ai-and-power-bi-are-transforming-commercial-residential-property-insurance%2F&amp;linkname=How%20AI%20and%20Power%20BI%20Are%20Transforming%20Commercial%20%26%20Residential%20Property%20Insurance" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-ai-and-power-bi-are-transforming-commercial-residential-property-insurance%2F&amp;linkname=How%20AI%20and%20Power%20BI%20Are%20Transforming%20Commercial%20%26%20Residential%20Property%20Insurance" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-ai-and-power-bi-are-transforming-commercial-residential-property-insurance%2F&amp;linkname=How%20AI%20and%20Power%20BI%20Are%20Transforming%20Commercial%20%26%20Residential%20Property%20Insurance" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-ai-and-power-bi-are-transforming-commercial-residential-property-insurance%2F&amp;linkname=How%20AI%20and%20Power%20BI%20Are%20Transforming%20Commercial%20%26%20Residential%20Property%20Insurance" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.ishir.com/">ISHIR | Custom AI Software Development Dallas Fort-Worth Texas</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Vithal Reddy">Vithal Reddy</a>. Read the original post at: <a href="https://www.ishir.com/blog/321023/how-ai-and-power-bi-are-transforming-commercial-residential-property-insurance.htm">https://www.ishir.com/blog/321023/how-ai-and-power-bi-are-transforming-commercial-residential-property-insurance.htm</a> </p>

Too Many Vulnerabilities? Here’s How AutoSecT Risk Prioritization Helps!

  • None
  • Published date: 2026-04-24 00:00:00

None

<p>If your security team is drowning in vulnerabilities, that’s math done wrong. Prioritize your risk with the right vulnerability assessment tool. Here’s why? The volume of vulnerabilities has exploded beyond what any team can realistically handle. <strong>48,185 CVEs</strong> were published in 2025, marking a <strong>20.6%</strong> increase compared to 2024. Approximately <strong>130 – 133 new vulnerabilities</strong> stand against security teams every day. Not only that, by early 2026, the global CVE database surpassed <strong>290,000 – 300,000</strong> total recorded vulnerabilities. Out of which, roughly <strong>35 – 40%</strong> of all published CVEs are classified as High or Critical severity.</p><h2 class="wp-block-heading">Vulnerability Assessment Tool For Risk Prioritization – The Need</h2><p>Here’s more to the scary story –</p><ul class="wp-block-list"> <li>The time to exploit vulnerabilities before patches are publicly available dropped to <strong>4.69 days</strong>.</li> <li>Roughly <strong>28% – 32%</strong> of vulnerabilities exploited are weaponized within 24 hours of disclosure</li> <li>While attackers move in days, enterprises take an average of <strong>55 days</strong> to patch critical vulnerabilities.</li> <li>Enterprises remediate only about <strong>16%</strong> of vulnerabilities per month on average.</li> <li>Around <strong>73</strong> of the vulnerabilities exploited in H1 2025 were used to launch ransomware attacks.</li> <li>The National Vulnerability Database backlog exceeded <strong>25,000</strong> unprocessed CVEs in early 2025. Thus, creating a blind spot for prioritization.</li> <li>Approximately <strong>60%</strong> of breached organizations had patches available for the exploited vulnerabilities, but had not yet applied them.</li> </ul><p>Why try to solve an unsolvable problem using the wrong approach? The real issue isn’t the number of vulnerabilities. It’s the lack of intelligent prioritization of risks.</p><p><br> <br> </p><br><meta charset="UTF-8"><br><meta name="viewport" content="width=device-width, initial-scale=1.0"><p> <!-- IMPORTANT: SEO control --><br> <meta name="robots" content="noindex, nofollow"></p><p> </p><title>Blog Form</title><br><div class="containers"> <!-- Left Section --> <div class="left-section"> <p class="heading-wrap">Book Your Free Cybersecurity Consultation Today!</p> <p> <img decoding="async" src="https://awareness.threatcop.ai/marketing/new_asset_blog_form.svg" alt="People working on cybersecurity" class="consultation-image"> </p></div> <p> <!-- Right Section --></p> <div class="right-section"> <div class="form-containers"> <form action="https://kratikal.com/thanks/thankyou-blog" method="get" onsubmit="return validateForm(this)"> <div class="form-group"> <label for="fullName">Full Name</label><br> <input type="text" required name="FullName" placeholder="Enter full name"> </div> <div class="form-group"> <label for="email">Email ID</label><br> <input type="email" required name="email" placeholder="your name @ example.com"> </div> <div class="form-group"> <label for="company">Company Name</label><br> <input type="text" required name="CompanyName" placeholder="Enter company name"> </div> <div class="form-group"> <label for="phone">Phone Number</label><br> <input type="number" required name="Phone" placeholder="Enter phone number"> </div> <p> <input type="hidden" name="BlogForm" value="BlogForm"><br> <button type="submit" class="submit-btnns" name="submit" value="I am interested!">I am interested!</button><br> </p></form> </div> </div> </div><p><!-- CSS Styles --></p><style> .containers{ display: flex; width: 100%; max-width: 800px; height: 500px; box-shadow: 0 0 10px rgba(0, 0, 0, 0.1); border-radius: 4px; overflow: hidden; margin: 25px auto; } .left-section { width: 50%; background-color: #000; color: white; padding: 30px; display: flex; flex-direction: column; position: relative; overflow: hidden; } .left-section .heading-wrap { font-size: 24px; line-height: 40px; margin-bottom: 30px; z-index: 2; position: relative; color: white; } .consultation-image { position: absolute; bottom: 0; left: 0; width: 100%; height: 70%; object-fit: cover; object-position: center; } .right-section { width: 50%; background-color: white; padding: 30px; display: flex; flex-direction: column; justify-content: center; } .form-containers { width: 100%; } .form-group { margin-bottom: 20px; } label { display: block; color: #666; margin-bottom: 5px; font-size: 14px; } .right-section input { width: 88%; padding: 12px 15px; border: 1px solid #e0e0e0; border-radius: 8px; font-size: 16px; } .submit-btnns { width: 100%; padding: 15px; background: linear-gradient(to right, #e67e22, #d35400); border: none; border-radius: 8px; color: white; font-size: 18px; font-weight: bold; cursor: pointer; margin-top: 10px; } /* Responsive */ @media (max-width: 768px) { .containers { flex-direction: column; height: auto; } .left-section, .right-section { width: 100%; } .left-section { height: 400px; } .consultation-image { height: 60%; } } @media (max-width: 480px) { .left-section { padding: 20px; height: 350px; } .left-section .heading-wrap { font-size: 17px; line-height: 28px;width: 80%; } .right-section { padding: 20px; } .right-section input, .submit-btnns { padding: 10px; } } </style><p><!-- JS Validation --><br> <script> function validateForm(form) { const inputs = form.querySelectorAll("input[type=text], input[type=email], input[type=number]"); for (let i = 0; i < inputs.length; i++) { if (/[<>]/.test(inputs[i].value)) { alert("Tags and attributes are not allowed in form fields!"); return false; // prevent submission } } return true; // allow submission } </script><br> <script defer src="https://static.cloudflareinsights.com/beacon.min.js/v8c78df7c7c0f484497ecbca7046644da1771523124516" integrity="sha512-8DS7rgIrAmghBFwoOTujcf6D9rXvH8xm8JQ1Ja01h9QX8EzXldiszufYa4IFfKdLUKTTrnSFXLDkUEOTrZQ8Qg==" data-cf-beacon='{"version":"2024.11.0","token":"33edbdb5f462496f85e52978979b687b","server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}' crossorigin="anonymous"></script> <script>(function(){function c(){var b=a.contentDocument||a.contentWindow.document;if(b){var d=b.createElement('script');d.innerHTML="window.__CF$cv$params={r:'9f15fa90cc7f813d',t:'MTc3NzA0MjgzOQ=='};var a=document.createElement('script');a.src='/cdn-cgi/challenge-platform/scripts/jsd/main.js';document.getElementsByTagName('head')[0].appendChild(a);";b.getElementsByTagName('head')[0].appendChild(d)}}if(document.body){var a=document.createElement('iframe');a.height=1;a.width=1;a.style.position='absolute';a.style.top=0;a.style.left=0;a.style.border='none';a.style.visibility='hidden';document.body.appendChild(a);if('loading'!==document.readyState)c();else if(window.addEventListener)document.addEventListener('DOMContentLoaded',c);else{var e=document.onreadystatechange||function(){};document.onreadystatechange=function(b){e(b);'loading'!==document.readyState&&(document.onreadystatechange=e,c())}}}})();</script></p><h2 class="wp-block-heading">Vulnerability Assessment Tool Removes The Illusion of “Fix Everything” </h2><p>Most organizations still operate under a flawed assumption: ‘If it’s critical, fix it first’. Here’s why:</p><ul class="wp-block-list"> <li>Only <strong>2 – 6% </strong>of vulnerabilities are ever exploited in the wild.</li> <li>Yet <strong>60 – 90% </strong>of vulnerabilities are labeled medium to critical by scoring systems.</li> <li>And only <strong>2.3% </strong>of high-severity vulnerabilities are actually exploited.</li> </ul><p>So what happens? You end up chasing thousands of “critical” issues, ignoring actual attack paths, burning resources on vulnerabilities that don’t matter, and many more. Meanwhile, the few vulnerabilities that do matter stay buried within the heap of issues.</p><h3 class="wp-block-heading">The Real Problem: Lack of Context</h3><p>The core issue isn’t visibility. Most organizations already have scanners, dashboards, and alerts. The real gap is <strong>context</strong>. Without context, all vulnerabilities look equally urgent. But in reality, risk depends on:</p><figure class="wp-block-table"> <table class="has-fixed-layout"> <tbody> <tr> <td><strong>Factors</strong></td> <td><strong>Highlights</strong></td> </tr> <tr> <td>Exposure</td> <td>Can an attacker even reach this asset?</td> </tr> <tr> <td>Exploitability</td> <td>Is there working exploit code?</td> </tr> <tr> <td>Business impact</td> <td>What happens if this system is compromised?</td> </tr> <tr> <td>Attack paths</td> <td>Can this vulnerability lead to lateral movement?</td> </tr> </tbody> </table> </figure><p>Without correlating these factors, it’s just prioritization done blindly.</p><h2 class="wp-block-heading">AutoSecT Vulnerability Assessment Tool: Risk-Based Prioritization That Actually Works.</h2><p>Instead of treating vulnerabilities as isolated findings, <strong><a href="https://kratikal.com/autosect"><mark class="has-inline-color has-luminous-vivid-orange-color">AutoSecT</mark></a></strong>, an AI-driven vulnerability scanner tool, evaluates them in context, turning raw data into actionable risk intelligence.</p><h3 class="wp-block-heading">From Volume-Based to Risk-Based Thinking</h3><p>If your vulnerability assessment tool asks, “How severe is this vulnerability?” – That’s wrong! Here’s what AutoSecT asks – “How likely is this to lead to a breach?”</p><p>That shift alone eliminates massive amounts of noise. Because when you prioritize based on real risk:</p><ul class="wp-block-list"> <li>Low-impact vulnerabilities drop out of focus</li> <li>High-risk vulnerabilities rise instantly to the top</li> </ul><h3 class="wp-block-heading">Contextual Risk Correlation</h3><p>AutoSecT correlates vulnerabilities with asset exposure (internal vs external), identity and privilege levels, data sensitivity, threat intelligence, and active exploitation. This aligns with modern best practices, where risk is determined by combining severity, exploitability, and business context and not just raw scores. The result? A prioritized list that actually reflects real-world attack scenarios.</p><h3 class="wp-block-heading">Attack Path Analysis</h3><p>Most tools treat vulnerabilities as isolated issues. Attackers don’t. They chain vulnerabilities together. AutoSecT maps attack paths, identifying:</p><ul class="wp-block-list"> <li>How an attacker could move laterally</li> <li>Vulnerabilities that act as entry points</li> <li>Entry points that can lead to critical assets</li> </ul><p>This is where prioritizing risks becomes strategic instead of reactive. You stop patching randomly and start breaking attack chains, using an AI-driven vulnerability assessment tool.</p><h3 class="wp-block-heading">Exploit Intelligence Integration</h3><p>AutoSecT integrates real-time threat intelligence, which also includes known exploited vulnerabilities (KEV), exploit availability, and active attack trends. And this is important because timing is critical. Most exploited vulnerabilities are exploited shortly after disclosure. Therefore, without this layer, you’re always reacting late.</p><h3 class="wp-block-heading">Drastic Reduction in Remediation Load</h3><p>Here’s the payoff. When you apply proper risk-based prioritization, you can eliminate up to 90 – 95% of vulnerabilities from immediate focus and still cover the majority of real-world threats</p><p>Research shows that intelligent prioritization frameworks can reduce urgent workloads; from thousands of vulnerabilities to a few hundred while maintaining high threat coverage. And that’s the difference between chaos and control when it comes to <a href="https://kratikal.com/blog/real-time-risk-detection-with-automated-vulnerability-assessment-tools/"><strong><mark class="has-inline-color has-luminous-vivid-orange-color">vulnerability assessment</mark></strong>.</a></p><h2 class="wp-block-heading">AutoSecT, Vulnerability Assessment and Risk Prioritization – What This Means for You!</h2><p>Let’s make it scenario-based. If the current approach of your organization looks like this:</p><ul class="wp-block-list"> <li>Patch everything labeled “critical”</li> <li>Work through the backlog chronologically</li> <li>Rely on CVSS as your primary filter</li> </ul><p>That means you are not strategizing smart. It is leading to wasted effort, missing real threats and failing to reduce actual risk. Therefore, switching to AutoSecT-style prioritization means:</p><ul class="wp-block-list"> <li>Fewer vulnerabilities to focus on</li> <li>Faster and reliable AI-driven remediation suggestion of real threats</li> <li>Clear visibility into risk reduction</li> </ul><p>And most importantly: You move from activity-based security to outcome-based security.</p><p><br> <br> </p><br><meta charset="UTF-8"><br><meta name="viewport" content="width=device-width, initial-scale=1.0"><br><title>Cyber Security Squad – Newsletter Signup</title><link rel="stylesheet" href="https://kratikal.com/blog/how-autosect-risk-prioritization-helps/styles.css"><link rel="preconnect" href="https://fonts.googleapis.com/"><link rel="preconnect" href="https://fonts.gstatic.com/" crossorigin><link href="https://fonts.googleapis.com/css2?family=Roboto:wght@400;500;700&amp;display=swap" rel="stylesheet"><style type="text/css"> /* Reset and base styles */</p> <p>.newsletterwrap .containerWrap { width: 100%; max-width: 800px; margin: 25px auto; }</p> <p>/* Card styles */ .newsletterwrap .signup-card { background-color: white; border-radius: 10px; overflow: hidden; box-shadow: 0 4px 12px rgba(0, 0, 0, 0.1); border: 8px solid #e85d0f; }</p> <p>.newsletterwrap .content { padding: 30px; display: flex; justify-content: space-between; align-items: center; flex-wrap: wrap; }</p> <p>/* Text content */ .newsletterwrap .text-content { flex: 1; min-width: 250px; margin-right: 20px; }</p> <p>.newsletterwrap .main-heading { font-size: 26px; color: #333; font-weight: 900; margin-bottom: 0px; }</p> <p>.newsletterwrap .highlight { color: #e85d0f; font-weight: 500; margin-bottom: 15px; }</p> <p>.newsletterwrap .para { color: #666; line-height: 1.5; margin-bottom: 10px; }</p> <p>.newsletterwrap .bold { font-weight: 700; }</p> <p>/* Logo */ .newsletterwrap .rightlogo { display: flex; flex-direction: column; align-items: center; margin-top: 10px; }</p> <p>.newsletterwrap .logo-icon { position: relative; width: 80px; height: 80px; margin-bottom: 10px; }</p> <p>.newsletterwrap .c-outer, .c-middle, .c-inner { position: absolute; border-radius: 50%; border: 6px solid #e85d0f; border-right-color: transparent; }</p> <p>.newsletterwrap .c-outer { width: 80px; height: 80px; top: 0; left: 0; }</p> <p>.newsletterwrap .c-middle { width: 60px; height: 60px; top: 10px; left: 10px; }</p> <p>.newsletterwrap .c-inner { width: 40px; height: 40px; top: 20px; left: 20px; }</p> <p>.newsletterwrap .logo-text { color: #e85d0f; font-weight: 700; font-size: 0.9rem; text-align: center; }</p> <p>/* Form */ .newsletterwrap .signup-form { display: flex; padding: 0 30px 30px; }</p> <p>.newsletterwrap input[type="email"] { flex: 1; padding: 12px 15px; border: 1px solid #ddd; border-radius: 4px 0 0 4px; font-size: 1rem; outline: none; }</p> <p>.newsletterwrap input[type="email"]:focus { border-color: #e85d0f; }</p> <p>.newsletterwrap .submitBtn { background-color: #e85d0f; color: white; border: none; padding: 12px 20px; border-radius: 0 4px 4px 0; font-size: 1rem; cursor: pointer; transition: background-color 0.3s; white-space: nowrap; }</p> <p>.newsletterwrap button:hover { background-color: #d45000; }</p> <p>/* Responsive styles */ @media (max-width: 768px) { .newsletterwrap .content { flex-direction: column; text-align: center; }</p> <p> .newsletterwrap .text-content { margin-right: 0; margin-bottom: 20px; }</p> <p> .newsletterwrap .rightlogo { margin-top: 20px; } }</p> <p>@media (max-width: 480px) { .newsletterwrap .signup-form { flex-direction: column; }</p> <p> .newsletterwrap input[type="email"] { border-radius: 4px; margin-bottom: 10px; }</p> <p> .newsletterwrap .submitBtn { border-radius: 4px; width: 100%; } } </style><p><br> </p><div class="containerWrap"> <div class="signup-card"> <div class="content"> <div class="text-content"> <h1 class="main-heading">Get in!</h1> <p class="para">Join our weekly <span style="color: #e75d10;">newsletter</span> and stay updated</p> </div> <div class="rightlogo"> <div class="logo-icon"> <div class="c-outer"></div> <div class="c-middle"></div> <div class="c-inner"></div> </div> <div class="logo-text">CYBER SECURITY SQUAD</div> </div> </div> <form class="signup-form" action="https://kratikal.com/thanks/thankyou-newsletter" method="get"> <input type="email" name="email" value="" placeholder="Email" required><br> <input type="submit" name="submit" value="I am interested!" class="submitBtn"><br> </form> </div> </div><p><br> </p><h2 class="wp-block-heading">The Bottom Line</h2><p>Even organizations like the National Institute of Standards and Technology are struggling to keep up with the sheer volume of vulnerabilities, forcing them to prioritize only the most critical ones for analysis.  That should tell you everything. You cannot fix everything, and you don’t need to fix everything. You just need to fix what actually matters. Prioritizing risk with AutoSecT’s assistance gives you clarity over chaos, focus over fatigue, and impact on activity.</p><p>And in today’s threat landscape, having a <strong><a href="https://kratikal.com/blog/importance-of-vulnerability-assessment-types-and-methodology/"><mark class="has-inline-color has-luminous-vivid-orange-color">good vulnerability assessment tool</mark></a></strong> is survival.</p><h2 class="wp-block-heading">Vulnerability Assessment Tool FAQs</h2><div class="schema-how-to wp-block-yoast-how-to-block"> <p class="schema-how-to-description"> </p><ol class="schema-how-to-steps"> <li class="schema-how-to-step" id="how-to-step-1777026022657"><strong class="schema-how-to-step-name"><strong>What is a vulnerability assessment tool?</strong></strong> <p class="schema-how-to-step-text">A vulnerability scanner tool scans assets, networks, and applications to identify security weaknesses, misconfigurations, and known vulnerabilities that attackers could exploit.</p> </li> <li class="schema-how-to-step" id="how-to-step-1777026036422"><strong class="schema-how-to-step-name">Why is risk prioritization important in vulnerability management?</strong> <p class="schema-how-to-step-text">Because not all vulnerabilities pose real risk. Prioritization helps teams focus on exploitable, high-impact issues instead of wasting time on low-risk findings.</p> </li> <li class="schema-how-to-step" id="how-to-step-1777026047936"><strong class="schema-how-to-step-name">How does a vulnerability scanner differ from risk-based prioritization tools?</strong> <p class="schema-how-to-step-text">A scanner only detects vulnerabilities, while risk-based tools analyze context like exploitability, asset value, and attack paths to rank what actually needs fixing first.</p> </li> </ol> </div><p><strong> <br></strong></p><p><strong><br></strong></p><p><strong><br></strong></p><p>The post <a href="https://kratikal.com/blog/how-autosect-risk-prioritization-helps/">Too Many Vulnerabilities? Here’s How AutoSecT Risk Prioritization Helps!</a> appeared first on <a href="https://kratikal.com/blog">Kratikal Blogs</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/too-many-vulnerabilities-heres-how-autosect-risk-prioritization-helps/" data-a2a-title="Too Many Vulnerabilities? Here’s How AutoSecT Risk Prioritization Helps!"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ftoo-many-vulnerabilities-heres-how-autosect-risk-prioritization-helps%2F&amp;linkname=Too%20Many%20Vulnerabilities%3F%20Here%E2%80%99s%20How%20AutoSecT%20Risk%20Prioritization%20Helps%21" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ftoo-many-vulnerabilities-heres-how-autosect-risk-prioritization-helps%2F&amp;linkname=Too%20Many%20Vulnerabilities%3F%20Here%E2%80%99s%20How%20AutoSecT%20Risk%20Prioritization%20Helps%21" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ftoo-many-vulnerabilities-heres-how-autosect-risk-prioritization-helps%2F&amp;linkname=Too%20Many%20Vulnerabilities%3F%20Here%E2%80%99s%20How%20AutoSecT%20Risk%20Prioritization%20Helps%21" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ftoo-many-vulnerabilities-heres-how-autosect-risk-prioritization-helps%2F&amp;linkname=Too%20Many%20Vulnerabilities%3F%20Here%E2%80%99s%20How%20AutoSecT%20Risk%20Prioritization%20Helps%21" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Ftoo-many-vulnerabilities-heres-how-autosect-risk-prioritization-helps%2F&amp;linkname=Too%20Many%20Vulnerabilities%3F%20Here%E2%80%99s%20How%20AutoSecT%20Risk%20Prioritization%20Helps%21" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://kratikal.com/blog/">Kratikal Blogs</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Puja Saikia">Puja Saikia</a>. Read the original post at: <a href="https://kratikal.com/blog/how-autosect-risk-prioritization-helps/">https://kratikal.com/blog/how-autosect-risk-prioritization-helps/</a> </p>

Microsoft’s April Security Update of High-Risk Vulnerability Notice for Multiple Products

  • None
  • Published date: 2026-04-24 00:00:00

None

<h2 class="wp-block-heading">Overview</h2><p>On April 15, NSFOCUS CERT detected that Microsoft released the April Security Update patch, fixing 165 security issues involving Windows, Microsoft Office, Microsoft SQL Server, Microsoft Visual Studio, Microsoft .NET Framework, Widely used products such as Azure, including high-risk vulnerability types such as privilege escalation and remote code execution.</p><p>Among the vulnerabilities fixed by Microsoft’s monthly update this month, there are 8 critical vulnerabilities, 154 important vulnerabilities, 2 moderate vulnerabilities, and 1 low-risk (Low) vulnerability. These include 1 vulnerability that has been detected for wild exploitation:</p><p><strong>Microsoft SharePoint Server Spoofing Vulnerability (CVE-2026-32201)</strong></p><p>Please update the patch as soon as possible for protection. For a complete list of vulnerabilities, please refer to the appendix.</p><p>Reference link: <a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Apr">https://msrc.microsoft.com/update-guide/releaseNote/2026-Apr</a></p><h2 class="wp-block-heading">Key Vulnerabilities</h2><p>Based on the product popularity and vulnerability importance, this update contains vulnerabilities with greater impact. Relevant users are requested to pay special attention:</p><p><strong>Microsoft SharePoint Server Spoofing Vulnerability (CVE-2026-32201):</strong></p><p>There is a spoofing vulnerability in Microsoft SharePoint Server. Due to improper input validation of SharePoint Server, unauthenticated attackers can conduct spoofing attacks through the network to view some sensitive information and tamper with publicly available information. The vulnerability is exploited in the wild and has a CVSS score of 9.0.</p><p>Official announcement link: <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201</a></p><p><strong>Windows Kerberos Privilege Escalation Vulnerability (CVE-2026-27912):</strong><strong></strong></p><p>There is a privilege escalation vulnerability in Windows Kerberos. Due to improper authorization during the verification process of the Kerberos service ticket request, an authenticated attacker can bypass security checks by manipulating the Kerberos ticket field and elevate privileges on adjacent networks, possibly gaining domain administrator privileges. CVSS score 8.0.</p><p>Official announcement link: <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27912">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27912</a></p><p><strong>Remote Desktop Client remote code execution vulnerability (CVE-2026-32157):</strong><strong></strong></p><p>A remote code execution vulnerability exists in the Remote Desktop Client. Due to the Use After Free problem when processing RDP connection parameters, an unauthenticated attacker can execute arbitrary code on the client host by tricking users into connecting to a malicious RDP server. CVSS score 8.8.</p><p>Official announcement link: <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32157">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32157</a></p><p><strong>Windows TCP/IP Remote Code Execution Vulnerability (CVE-2026-33827):</strong><strong></strong></p><p>A remote code execution vulnerability exists in Windows TCP/IP. Due to improper synchronization mechanism when using shared resources in Windows TCP/IP, an unauthenticated attacker can exploit this vulnerability over the network to execute arbitrary code. CVSS score 8.1.</p><p>Official announcement link: <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33827">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33827</a></p><p><strong>Windows Shell Security Function Bypass Vulnerability (CVE-2026-32225):</strong><strong></strong></p><p>There is a security feature bypass vulnerability in Windows Shell. Due to the failure of the protection mechanism in Windows Shell, an unauthenticated attacker can bypass SmartScreen security protection by tricking the victim into opening a specially crafted .lnk file, resulting in unauthorized operation or access. CVSS score 8.8.</p><p>Official announcement link: <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32225">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32225</a></p><p><strong>Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability (CVE-2026-33824):</strong></p><p>A remote code execution vulnerability exists in Windows Internet Key Exchange (IKE) Service Extensions, which allows an unauthenticated attacker to send specially crafted packets to IKEv2 enabled Windows systems due to a Double Free issue in the Windows IKE extension. Thereby enabling remote code execution. CVSS score 9.8.</p><p>Official announcement link: <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33824">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33824</a></p><p><strong>Microsoft Defender Privilege Escalation Vulnerability (CVE-2026-33825):</strong><strong></strong></p><p>There is a privilege escalation vulnerability in Microsoft Defender. Due to insufficient access control granularity in Microsoft Defender, an authenticated local attacker can elevate privileges to SYSTEM. CVSS score 7.8.</p><p>Official announcement link: <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825</a></p><p><strong>Windows Active Directory Remote Code Execution Vulnerability (CVE-2026-33826):</strong><strong></strong></p><p>A remote code execution vulnerability exists in Windows Active Directory. Due to improper input validation in Windows Active Directory, an authenticated attacker can send a specially crafted RPC call to the RPC host through an adjacent network to achieve remote code execution. CVSS score 8.0.</p><p>Official announcement link: <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33826">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33826</a></p><h2 class="wp-block-heading">Scope of Impact</h2><p>The following are the affected product versions of some key vulnerabilities. For the scope of products affected by other vulnerabilities, please refer to the official announcement link.</p><figure class="wp-block-table is-style-stripes"> <table class="has-fixed-layout"> <thead> <tr> <th>Vulnerability Number</th> <th>Affected product versions</th> </tr> </thead> <tbody> <tr> <td>CVE-2026-32201</td> <td>Microsoft SharePoint Server Subscription Edition <br>Microsoft SharePoint Enterprise Server 2016 <br>Microsoft SharePoint Server 2019</td> </tr> <tr> <td>CVE-2026-27912</td> <td>Windows Server 2012 R2 (Server Core installation) <br>Windows Server 2012 R2 <br>Windows Server 2012 (Server Core installation) Windows Server 2012 <br>Windows Server 2016 (Server Core installation) <br>Windows Server 2016 <br>Windows Server 2025 <br>Windows Server 2022, 23H2 Edition (Server Core installation) <br>Windows Server 2025 (Server Core installation) <br>Windows Server 2022 (Server Core installation) <br>Windows Server 2022 <br>Windows Server 2019 (Server Core installation) <br>Windows Server 2019</td> </tr> <tr> <td>CVE-2026-32157</td> <td>Windows Server 2012 R2 (Server Core installation) <br>Windows Server 2012 R2 <br>Windows Server 2012 (Server Core installation) <br>Windows Server 2012 <br>Windows Server 2016 (Server Core installation) <br>Windows Server 2016 <br>Windows 10 Version 1607 for x64-based Systems <br>Windows 10 Version 1607 for 32-bit Systems <br>Windows Server 2025 <br>Windows 11 Version 24H2 for x64-based Systems <br>Windows 11 Version 24H2 for ARM64-based Systems <br>Windows Server 2022, 23H2 Edition (Server Core installation) <br>Windows 11 Version 23H2 for x64-based Systems <br>Windows 11 Version 23H2 for ARM64-based Systems <br>Windows 11 Version 25H2 for x64-based Systems <br>Windows 11 Version 25H2 for ARM systems <br>Windows Server 2025 (Server Core installation) <br>Windows 10 Version 22H2 for 32-bit Systems <br>Windows 10 Version 22H2 for ARM64-based Systems <br>Windows 10 Version 22H2 for x64-based Systems <br>Windows 10 Version 21H2 for x64-based Systems <br>Windows 10 Version 21H2 for ARM64-based Systems <br>Windows 10 Version 21H2 for 32-bit Systems <br>Windows Server 2022 (Server Core installation) <br>Windows Server 2022 Remote Desktop client for Windows Desktop <br>Windows Server 2019 (Server Core installation) <br>Windows Server 2019 <br>Windows 10 Version 1809 for x64-based Systems <br>Windows 10 Version 1809 for 32-bit Systems <br>Windows App Client for Windows Desktop <br>Windows 11 version 26H1 for x64-based Systems <br>Windows 11 Version 26H1 for ARM64-based Systems</td> </tr> <tr> <td>CVE-2026-33827 CVE-2026-32225</td> <td>Windows 10 Version 22H2 for ARM64-based Systems <br>Windows 10 Version 22H2 for x64-based Systems <br>Windows 10 Version 21H2 for x64-based Systems <br>Windows 10 Version 21H2 for ARM64-based Systems <br>Windows 10 Version 21H2 for 32-bit Systems <br>Windows Server 2022 (Server Core installation) <br>Windows Server 2022 <br>Windows Server 2019 (Server Core installation) Windows Server 2019 <br>Windows 10 Version 1809 for x64-based Systems <br>Windows 10 Version 1809 for 32-bit Systems <br>Windows Server 2025 (Server Core installation) <br>Windows 10 Version 22H2 for 32-bit Systems <br>Windows Server 2012 R2 (Server Core installation) <br>Windows Server 2012 R2 <br>Windows Server 2012 (Server Core installation) <br>Windows Server 2012 <br>Windows Server 2016 (Server Core installation) <br>Windows Server 2016 <br>Windows 10 Version 1607 for x64-based Systems <br>Windows 10 Version 1607 for 32-bit Systems <br>Windows 11 Version 26H1 for ARM64-based Systems <br>Windows 11 version 26H1 for x64-based Systems <br>Windows Server 2025 <br>Windows 11 Version 24H2 for x64-based Systems <br>Windows 11 Version 24H2 for ARM64-based Systems <br>Windows Server 2022, 23H2 Edition (Server Core installation) <br>Windows 11 Version 23H2 for x64-based Systems <br>Windows 11 Version 23H2 for ARM64-based Systems <br>Windows 11 Version 25H2 for x64-based Systems <br>Windows 11 Version 25H2 for ARM systems</td> </tr> <tr> <td>CVE-2026-33824</td> <td>Windows Server 2016 (Server Core installation) <br>Windows Server 2016 <br>Windows 10 Version 1607 for x64-based Systems <br>Windows 10 Version 1607 for 32-bit Systems <br>Windows 11 Version 26H1 for ARM64-based Systems <br>Windows 11 version 26H1 for x64-based Systems <br>Windows Server 2025 <br>Windows 11 Version 24H2 for x64-based Systems <br>Windows 11 Version 24H2 for ARM64-based Systems <br>Windows Server 2022, 23H2 Edition (Server Core installation) <br>Windows 11 Version 23H2 for x64-based Systems <br>Windows 11 Version 23H2 for ARM64-based Systems <br>Windows 11 Version 25H2 for x64-based Systems <br>Windows 11 Version 25H2 for ARM systems <br>Windows Server 2025 (Server Core installation) <br>Windows 10 Version 22H2 for 32-bit Systems <br>Windows 10 Version 22H2 for ARM64-based Systems <br>Windows 10 Version 22H2 for x64-based Systems <br>Windows 10 Version 21H2 for x64-based Systems <br>Windows 10 Version 21H2 for ARM64-based Systems <br>Windows 10 Version 21H2 for 32-bit Systems <br>Windows Server 2022 (Server Core installation) <br>Windows Server 2022 <br>Windows Server 2019 (Server Core installation) Windows Server 2019 <br>Windows 10 Version 1809 for x64-based Systems <br>Windows 10 Version 1809 for 32-bit Systems</td> </tr> <tr> <td>CVE-2026-33825</td> <td>Microsoft Defender Antimalware Platform</td> </tr> <tr> <td>CVE-2026-33826</td> <td>Windows Server 2012 R2 (Server Core installation) <br>Windows Server 2012 R2 <br>Windows Server 2016 (Server Core installation) <br>Windows Server 2016 <br>Windows Server 2025 <br>Windows Server 2022, 23H2 Edition (Server Core installation) <br>Windows Server 2025 (Server Core installation) <br>Windows Server 2022 (Server Core installation) <br>Windows Server 2022 <br>Windows Server 2019 (Server Core installation) <br>Windows Server 2019</td> </tr> </tbody> </table> </figure><h2 class="wp-block-heading">Mitigation</h2><p>At present, Microsoft has officially released security patches to fix the above vulnerabilities for supported product versions. It is strongly recommended that affected users install patches as soon as possible for protection. The official download link: <a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Apr">https://msrc.microsoft.com/update-guide/releaseNote/2026-Apr</a></p><p>Note: Patch updates for Windows Update may fail due to network problems, computer environment problems, etc. After installing the patch, users should check whether the patch has been successfully updated in time.</p><p>Right-click the Windows icon, select “Settings (N)”, select “Update and Security”-“Windows Update”, view the prompt information on this page, or click “View Update History” to view the historical update status.</p><p>For updates that have not been successfully installed, you can click the update name to jump to the Microsoft official download page. It is recommended that users click the link on this page and go to the “Microsoft Update Catalog” website to download the independent program package and install it.</p><h2 class="wp-block-heading">Appendix: Vulnerability List</h2><figure class="wp-block-table is-style-stripes"> <table class="has-fixed-layout"> <thead> <tr> <th><strong>Affected products</strong></th> <th><strong>CVE No.</strong></th> <th><strong>Vulnerability Title</strong></th> <th><strong>Severity</strong></th> </tr> </thead> <tbody> <tr> <td>Windows</td> <td>CVE-2026-32157</td> <td>Remote Desktop Client remote code execution vulnerability</td> <td>Critical</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-33826</td> <td>Windows Active Directory Remote Code Execution Vulnerability</td> <td>Critical</td> </tr> <tr> <td>Microsoft .NET Framework</td> <td>CVE-2026-23666</td> <td>.NET Framework Denial of Service Vulnerability</td> <td>Critical</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2026-32190</td> <td>Microsoft Office Remote Code Execution Vulnerability</td> <td>Critical</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2026-33114</td> <td>Microsoft Word remote code execution vulnerability</td> <td>Critical</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2026-33115</td> <td>Microsoft Word remote code execution vulnerability</td> <td>Critical</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-33827</td> <td>Windows TCP/IP Remote Code Execution Vulnerability</td> <td>Critical</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-33824</td> <td>Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability</td> <td>Critical</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-20930</td> <td>Windows Management Services Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Visual Studio Code CoPilot Chat Extension</td> <td>CVE-2026-23653</td> <td>GitHub Copilot and Visual Studio Code Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-25184</td> <td>Applocker Filter Driver (applockerfltr.sys) Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2026-20945</td> <td>Microsoft SharePoint Server Spoofing Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-23670</td> <td>Windows Virtualization-Based Security (VBS) security feature bypass vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Dynamics</td> <td>CVE-2026-26149</td> <td>Microsoft Power Apps Security Feature Bypass</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26151</td> <td>Remote Desktop spoofing vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26154</td> <td>Windows Server Update Service (WSUS) Tampering Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26155</td> <td>Microsoft Local Security Authority Subsystem Service information disclosure vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26160</td> <td>Remote Desktop Licensing Service privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26161</td> <td>Windows Sensor Data Service privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26162</td> <td>Windows OLE privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26165</td> <td>Windows Shell Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26166</td> <td>Windows Shell Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26167</td> <td>Windows Push Notifications privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26174</td> <td>Windows Server Update Service (WSUS) Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26175</td> <td>Windows Boot Manager security feature bypass vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26179</td> <td>Windows Kernel privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26180</td> <td>Windows Kernel privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26181</td> <td>Microsoft Brokering File System Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26183</td> <td>Remote Access Management service/API (RPC server) privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27906</td> <td>Windows Hello security feature bypass vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27907</td> <td>Windows Storage Spaces Controller privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27908</td> <td>Windows TDI Translation Driver (tdx.sys) Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27915</td> <td>Windows UPnP Device Host privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27917</td> <td>Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27918</td> <td>Windows Shell Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27919</td> <td>Windows UPnP Device Host privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27921</td> <td>Windows TDI Translation Driver (tdx.sys) Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27924</td> <td>Desktop Window Manager Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27926</td> <td>Windows Cloud Files Mini Filter Driver privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27927</td> <td>Windows Projected File System Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27929</td> <td>Windows LUA File Virtualization Filter Driver Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27931</td> <td>Windows GDI Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32071</td> <td>Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32073</td> <td>Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32075</td> <td>Windows UPnP Device Host privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32081</td> <td>Package Catalog information leakage vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32082</td> <td>Windows Simple Search and Discovery Protocol (SSDP) Service privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32083</td> <td>Windows Simple Search and Discovery Protocol (SSDP) Service privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32085</td> <td>Remote Procedure Call information leakage vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32087</td> <td>Windows Function Discovery Service (fdwsd.dll) Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32089</td> <td>Windows Speech Brokered Api Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32090</td> <td>Windows Speech Brokered Api Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32093</td> <td>Windows Function Discovery Service (fdwsd.dll) Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32152</td> <td>Desktop Window Manager Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32154</td> <td>Desktop Window Manager Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32156</td> <td>Windows UPnP Device Host Remote Code Execution Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32158</td> <td>Windows Push Notifications privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32159</td> <td>Windows Push Notifications privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32160</td> <td>Windows Push Notifications privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-0390</td> <td>UEFI Secure Boot security feature bypass vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32165</td> <td>Windows User Interface Core Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft SQL Server</td> <td>CVE-2026-32167</td> <td>SQL Server Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Azure</td> <td>CVE-2026-32168</td> <td>Azure Monitor Agent privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>.NET 9.0 installed on Mac OS,<br>.NET 9.0 installed on Windows,<br>.NET 10.0 installed on Mac OS,<br>.NET 9.0 installed on Linux,<br>.NET,Microsoft Visual Studio,<br>.NET 10.0 installed on Windows,<br>.NET 8.0 installed on Windows,<br>.NET 8.0 installed on Mac OS,<br>.NET 10.0 installed on Linux,<br>.NET 8.0 installed on Linux</td> <td>CVE-2026-32178</td> <td>.NET Spoofing Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32181</td> <td>Connected User Experiences and Telemetry Service Denial of Service Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32183</td> <td>Windows Snipping Tool Remote Code Execution Vulnerability</td> <td>Important</td> </tr> <tr> <td>Azure</td> <td>CVE-2026-32184</td> <td>Microsoft High Performance Compute (HPC) Pack privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2026-32188</td> <td>Microsoft Excel Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2026-32189</td> <td>Microsoft Excel Remote Code Execution Vulnerability</td> <td>Important</td> </tr> <tr> <td>Azure</td> <td>CVE-2026-32192</td> <td>Azure Monitor Agent privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32195</td> <td>Windows Kernel privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32202</td> <td>Windows Shell Spoofing Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32215</td> <td>Windows Kernel Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32216</td> <td>Windows Redirected Drive Buffering System Denial of Service Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32217</td> <td>Windows Kernel Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32218</td> <td>Windows Kernel Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32219</td> <td>Microsoft Brokering File System Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32220</td> <td>UEFI Secure Boot security feature bypass vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32221</td> <td>Windows Graphics Component Remote Code Execution Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32222</td> <td>Windows Win32k Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32223</td> <td>Windows USB Printing Stack (usbprint.sys) Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32224</td> <td>Windows Server Update Service (WSUS) Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft .NET Framework</td> <td>CVE-2026-32226</td> <td>.NET Framework Denial of Service Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2026-33095</td> <td>Microsoft Word remote code execution vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-33096</td> <td>HTTP.sys denial of service vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-33098</td> <td>Windows Container Isolation FS Filter Driver Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>.NET 9.0 installed on Mac OS,<br>.NET 9.0 installed on Windows,<br>Microsoft .NET Framework,<br>.NET 10.0 installed on Mac OS,<br>.NET 9.0 installed on Linux,<br>.NET,.NET 8.0 installed on Windows,<br>.NET 8.0 installed on Mac OS,<br>.NET 10.0 installed on Linux,<br>.NET 8.0 installed on Linux</td> <td>CVE-2026-33116</td> <td>.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft SQL Server</td> <td>CVE-2026-33120</td> <td>Microsoft SQL Server Remote Code Execution Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2026-33822</td> <td>Microsoft Word Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32212</td> <td>Universal Plug and Play (upnp.dll) information disclosure vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-20928</td> <td>Windows Recovery Environment Security Function Bypass Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-20806</td> <td>Windows COM Server Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2026-23657</td> <td>Microsoft Word remote code execution vulnerability</td> <td>Important</td> </tr> <tr> <td>PowerShell</td> <td>CVE-2026-26143</td> <td>Microsoft PowerShell security feature bypass vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26152</td> <td>Microsoft Cryptographic Services privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26153</td> <td>Windows Encrypted File System (EFS) Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26156</td> <td>Windows Hyper-V remote code execution vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26159</td> <td>Remote Desktop Licensing Service privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26163</td> <td>Windows Kernel privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26168</td> <td>Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26169</td> <td>Windows Kernel Memory Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26170</td> <td>PowerShell privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26172</td> <td>Windows Push Notifications privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26173</td> <td>Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26176</td> <td>Windows Client Side Caching driver (csc.sys) Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26177</td> <td>Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26178</td> <td>Windows Advanced Rasterization Platform Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26182</td> <td>Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-26184</td> <td>Windows Projected File System Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27909</td> <td>Windows Search Service privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27910</td> <td>Windows Installer privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27911</td> <td>Windows User Interface Core Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27912</td> <td>Windows Kerberos privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27913</td> <td>Windows BitLocker security feature bypass vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27914</td> <td>Microsoft Management Console Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27916</td> <td>Windows UPnP Device Host privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27920</td> <td>Windows UPnP Device Host privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27922</td> <td>Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27923</td> <td>Desktop Window Manager Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27925</td> <td>Windows UPnP Device Host information disclosure vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27928</td> <td>Windows Hello security feature bypass vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-27930</td> <td>Windows GDI Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32068</td> <td>Windows Simple Search and Discovery Protocol (SSDP) Service privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32069</td> <td>Windows Projected File System Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32070</td> <td>Windows Common Log File System Driver Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32072</td> <td>Active Directory Spoofing Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32074</td> <td>Windows Projected File System Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32076</td> <td>Windows Storage Spaces Controller privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32077</td> <td>Windows UPnP Device Host privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32078</td> <td>Windows Projected File System Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32079</td> <td>Web Account Manager Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32080</td> <td>Windows WalletService privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32084</td> <td>Windows Print Spooler Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32086</td> <td>Windows Function Discovery Service (fdwsd.dll) Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32088</td> <td>Windows Biometric Service security feature bypass vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32091</td> <td>Microsoft Brokering File System Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32149</td> <td>Windows Hyper-V remote code execution vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32150</td> <td>Windows Function Discovery Service (fdwsd.dll) Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32151</td> <td>Windows Shell Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32153</td> <td>Windows Speech Runtime privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32155</td> <td>Desktop Window Manager Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32162</td> <td>Windows COM Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32163</td> <td>Windows User Interface Core Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32164</td> <td>Windows User Interface Core Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Azure</td> <td>CVE-2026-32171</td> <td>Azure Logic Apps privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft SQL Server</td> <td>CVE-2026-32176</td> <td>SQL Server Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32196</td> <td>Windows Admin Center Spoofing Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2026-32197</td> <td>Microsoft Excel Remote Code Execution Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2026-32198</td> <td>Microsoft Excel Remote Code Execution Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2026-32199</td> <td>Microsoft Excel Remote Code Execution Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2026-32200</td> <td>Microsoft PowerPoint remote code execution vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2026-32201</td> <td>Microsoft SharePoint Server Spoofing Vulnerability</td> <td>Important</td> </tr> <tr> <td>.NET 9.0 installed on Mac OS,<br>.NET 9.0 installed on Windows,<br>.NET 10.0 installed on Mac OS,<br>.NET 9.0 installed on Linux,<br>.NET 10.0 installed on Windows,<br>.NET 8.0 installed on Windows,<br>.NET 8.0 installed on Mac OS,<br>.NET 10.0 installed on Linux,<br>.NET 8.0 installed on Linux</td> <td>CVE-2026-26171</td> <td>.NET Denial of Service Vulnerability</td> <td>Important</td> </tr> <tr> <td>.NET 9.0 installed on Mac OS,<br>.NET 9.0 installed on Windows,<br>.NET 10.0 installed on Mac OS,<br>.NET 9.0 installed on Linux,<br>Microsoft Visual Studio,<br>.NET 10.0 installed on Windows,<br>.NET 8.0 installed on Windows,<br>.NET 8.0 installed on Mac OS,<br>.NET 10.0 installed on Linux,<br>.NET 8.0 installed on Linux</td> <td>CVE-2026-32203</td> <td>.NET and Visual Studio Denial of Service Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32225</td> <td>Windows Shell security feature bypass vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-33099</td> <td>Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-33100</td> <td>Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-33101</td> <td>Windows Print Spooler privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Dynamics</td> <td>CVE-2026-33103</td> <td>Microsoft Dynamics 365 (On-Premises) information disclosure vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-33104</td> <td>Win32k Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-32214</td> <td>Universal Plug and Play (upnp.dll) information disclosure vulnerability</td> <td>Important</td> </tr> <tr> <td>System Center</td> <td>CVE-2026-33825</td> <td>Microsoft Defender privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2026-33829</td> <td>Windows Snipping Tool spoofing vulnerability</td> <td>Moderate</td> </tr> <tr> <td>Microsoft Edge for Android</td> <td>CVE-2026-33119</td> <td>Microsoft Edge (Chromium-based) for Android spoofing vulnerability</td> <td>Moderate</td> </tr> <tr> <td>Microsoft Edge (Chromium-based)</td> <td>CVE-2026-33118</td> <td>Microsoft Edge (Chromium-based) spoofing vulnerability</td> <td>Low</td> </tr> </tbody> </table> </figure><h2 class="wp-block-heading">Statement</h2><p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and/or indirect consequences and losses caused by transmitting and/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add/delete any information to/from it, or use this advisory for commercial purposes without permission from NSFOCUS.</p><h2 class="wp-block-heading">About NSFOCUS</h2><p>NSFOCUS, a pioneering leader in cybersecurity, is dedicated to safeguarding telecommunications, Internet service providers, hosting providers, and enterprises from sophisticated cyberattacks.</p><p>Founded in 2000, NSFOCUS operates globally with over 3000 employees at two headquarters in Beijing, China, and Santa Clara, CA, USA, and over 50 offices worldwide. It has a proven track record of protecting over 25% of the Fortune Global 500 companies, including four of the five largest banks and six of the world’s top ten telecommunications companies.</p><p>Leveraging technical prowess and innovation, NSFOCUS delivers a comprehensive suite of security solutions, including the Intelligent Security Operations Platform (ISOP) for modern SOC, DDoS Protection, Continuous Threat Exposure Management (CTEM) Service and Web Application and API Protection (WAAP). All the solutions and services are augmented by the Security Large Language Model (SecLLM), ML, patented algorithms and other cutting-edge research achievements developed by NSFOCUS.</p><p>The post <a href="https://nsfocusglobal.com/microsofts-april-security-update-of-high-risk-vulnerability-notice-for-multiple-products/">Microsoft’s April Security Update of High-Risk Vulnerability Notice for Multiple Products</a> appeared first on <a href="https://nsfocusglobal.com/">NSFOCUS</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/microsofts-april-security-update-of-high-risk-vulnerability-notice-for-multiple-products/" data-a2a-title="Microsoft’s April Security Update of High-Risk Vulnerability Notice for Multiple Products"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmicrosofts-april-security-update-of-high-risk-vulnerability-notice-for-multiple-products%2F&amp;linkname=Microsoft%E2%80%99s%20April%20Security%20Update%20of%20High-Risk%20Vulnerability%20Notice%20for%20Multiple%20Products" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmicrosofts-april-security-update-of-high-risk-vulnerability-notice-for-multiple-products%2F&amp;linkname=Microsoft%E2%80%99s%20April%20Security%20Update%20of%20High-Risk%20Vulnerability%20Notice%20for%20Multiple%20Products" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmicrosofts-april-security-update-of-high-risk-vulnerability-notice-for-multiple-products%2F&amp;linkname=Microsoft%E2%80%99s%20April%20Security%20Update%20of%20High-Risk%20Vulnerability%20Notice%20for%20Multiple%20Products" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmicrosofts-april-security-update-of-high-risk-vulnerability-notice-for-multiple-products%2F&amp;linkname=Microsoft%E2%80%99s%20April%20Security%20Update%20of%20High-Risk%20Vulnerability%20Notice%20for%20Multiple%20Products" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmicrosofts-april-security-update-of-high-risk-vulnerability-notice-for-multiple-products%2F&amp;linkname=Microsoft%E2%80%99s%20April%20Security%20Update%20of%20High-Risk%20Vulnerability%20Notice%20for%20Multiple%20Products" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://nsfocusglobal.com/">NSFOCUS</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by NSFOCUS">NSFOCUS</a>. Read the original post at: <a href="https://nsfocusglobal.com/microsofts-april-security-update-of-high-risk-vulnerability-notice-for-multiple-products/">https://nsfocusglobal.com/microsofts-april-security-update-of-high-risk-vulnerability-notice-for-multiple-products/</a> </p>

PixerLens and Tata Consultancy Services Partner to Deliver AI-Powered Application Intelligence on TCS SovereignSecure™ Cloud

  • None
  • Published date: 2026-04-23 13:14:31

PixerLens and Tata Consultancy Services Partner to Deliver AI-Powered Application Intelligence on TCS SovereignSecure™ Cloud

PLEASANTON, Calif., April 23, 2026 /PRNewswire/ -- PixerLens, Inc. announces a strategic partnership with Tata Consultancy Services (TCS) to jointly deliver advanced AI-powered solutions to enterpris… [+4345 chars]

AFCEA International Announces The Cyber Edge Writing Award Winners for 2026

  • AFCEA International
  • Published date: 2026-04-23 13:10:00

Top 3 articles to be published in SIGNAL Magazine Top 3 articles to be published in SIGNAL Magazine

Fairfax, Virginia, April 23, 2026 (GLOBE NEWSWIRE) -- The rise of generative artificial intelligence (GenAI) is transforming the global cybersecurity landscape, affecting how military operations, nat… [+5822 chars]

FM Nirmala Sitharaman meets heads of banks on AI risks following concerns over Anthropic's Mythos

  • PTI
  • Published date: 2026-04-23 11:42:54

Finance Minister Nirmala Sitharaman convened a meeting with bank heads to address Artificial Intelligence (AI) risks, particularly concerning Anthropic's Mythos model and its potential to compromise financial system data security. Banks have been urged to imp…

New Delhi: Finance Minister Nirmala Sitharaman on Thursday met heads of banks on risks related to Artificial Intelligence (AI) following global concerns over Anthropic's Mythos model threatening data… [+1667 chars]

How to Build an AI Company Now

  • None
  • Published date: 2026-04-23 00:00:00

None

<p>The post <a href="https://raffy.ch/blog/2026/04/23/how-to-build-an-ai-company-now/">How to Build an AI Company Now</a> appeared first on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy &amp; Innovation with Raffy</a>.</p><figure class="wp-block-image size-large"><a href="https://raffy.ch/blog/wp-content/uploads/2026/04/ChatGPT-Image-Apr-23-2026-01_31_29-PM.png"><img fetchpriority="high" decoding="async" width="1024" height="576" src="https://raffy.ch/blog/wp-content/uploads/2026/04/ChatGPT-Image-Apr-23-2026-01_31_29-PM-1024x576.png" alt="" class="wp-image-1672" srcset="https://raffy.ch/blog/wp-content/uploads/2026/04/ChatGPT-Image-Apr-23-2026-01_31_29-PM-1024x576.png 1024w, https://raffy.ch/blog/wp-content/uploads/2026/04/ChatGPT-Image-Apr-23-2026-01_31_29-PM-300x169.png 300w, https://raffy.ch/blog/wp-content/uploads/2026/04/ChatGPT-Image-Apr-23-2026-01_31_29-PM-768x432.png 768w, https://raffy.ch/blog/wp-content/uploads/2026/04/ChatGPT-Image-Apr-23-2026-01_31_29-PM-1536x864.png 1536w, https://raffy.ch/blog/wp-content/uploads/2026/04/ChatGPT-Image-Apr-23-2026-01_31_29-PM.png 1672w" sizes="(max-width: 1024px) 100vw, 1024px"></a></figure><p>I had a few conversations over the past days that all pointed to the same conclusion: many technology companies are still being built like old SaaS companies. That is a mistake. If you are building a technology product now, the priority is not a polished frontend. It is the backend: the data layer, the ontology, the APIs, the analytics layer, the authentication model, and the infrastructure that makes AI agents fast, reliable, and cheap to run on top of the data backend. The frontend still matters, but it should not be the center of gravity anymore.</p><h2 class="wp-block-heading">TL;DR</h2><ul class="wp-block-list"> <li>Start with the backend and data model, not the dashboard.</li> <li>Build for token efficiency as a product requirement, not just an infrastructure metric.</li> <li>Expose core capabilities through APIs and agent-friendly interfaces first.</li> <li>Keep the UI light, flexible, and increasingly self-serve.</li> <li>If every deployment needs heavy forward deployed engineering, the product is not ready yet.</li> </ul><h2 class="wp-block-heading">The Moat Is Moving Down the Stack</h2><p>In the old SaaS model, a lot of value sat in the application layer. You built workflows, dashboards, role-based views, and configuration screens. In AI-native software, that is no longer enough. The durable part of the company is increasingly lower in the stack: the system that structures data correctly, retrieves the right context quickly, exposes useful actions cleanly, and does all of that in a reliable and token-efficient way.</p><p>If that layer is weak, the rest of the product becomes slow, expensive, brittle, and hard to customize. If that layer is strong, you can build a surprising amount on top of it very quickly.</p><h2 class="wp-block-heading">The UI Should Get Thinner</h2><p>A lot of teams still think about product development as: first build the dashboard, then add AI to it. I think it is increasingly the opposite. First build the backend that can answer questions, retrieve context, execute actions, and expose capabilities cleanly. Then add lightweight interfaces on top.</p><p>Initially, those interfaces may be very thin. In some cases they may barely be a product UI at all. A technical user might interact through Claude, another agent interface, or an internal tool layer. Over time, you can add more purpose-built interfaces and dashboards, but those should sit on top of a backend that already works well in a headless way.</p><h2 class="wp-block-heading">Token Efficiency Is a Product Decision</h2><p>One of the bigger mistakes right now is treating token usage as a backend optimization problem. It is not. It is a product design problem. If your system cannot give agents the right context in the right shape, the product becomes costly to operate and difficult to scale. That affects margins, response times, user experience, and the kinds of workflows that are even viable.</p><p>This is why the backend matters so much. You need data structures, query systems, and analytics layers that are built for AI interaction, not just for human dashboards. A beautiful interface on top of an inefficient backend is not an AI product. It is a demo with a future cost problem.</p><h2 class="wp-block-heading">The Goal Is Self-Serve Customization</h2><p>A lot of tech companies are also running into the same trap: they need too much forward deployed engineering to make each customer successful. That is understandable for now, but it is not where you want to stay. The goal should be to make the platform configurable enough that a solutions engineer, a sales engineer, or eventually even the customer can shape the experience without constantly pulling in core backend engineers.</p><p>That only works if the system is designed the right way. If the logic, data model, and capabilities are modular and exposed well, you can let people create their own views, workflows, and operating layers on top. If not, every customer request turns into a product detour.</p><p>Build the engine first. Build the data layer properly. Make it fast, cheap, reliable, and cleanly exposed. Then let the frontend become lighter, more dynamic, and more self-serve over time. That is increasingly the difference between an AI first company and a SaaS company with an AI feature.</p><p>The post <a href="https://raffy.ch/blog/2026/04/23/how-to-build-an-ai-company-now/">How to Build an AI Company Now</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy &amp; Innovation with Raffy</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/how-to-build-an-ai-company-now/" data-a2a-title="How to Build an AI Company Now"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-to-build-an-ai-company-now%2F&amp;linkname=How%20to%20Build%20an%20AI%20Company%20Now" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-to-build-an-ai-company-now%2F&amp;linkname=How%20to%20Build%20an%20AI%20Company%20Now" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-to-build-an-ai-company-now%2F&amp;linkname=How%20to%20Build%20an%20AI%20Company%20Now" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-to-build-an-ai-company-now%2F&amp;linkname=How%20to%20Build%20an%20AI%20Company%20Now" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-to-build-an-ai-company-now%2F&amp;linkname=How%20to%20Build%20an%20AI%20Company%20Now" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy &amp;amp; Innovation with Raffy</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Raffael Marty">Raffael Marty</a>. Read the original post at: <a href="https://raffy.ch/blog/2026/04/23/how-to-build-an-ai-company-now/">https://raffy.ch/blog/2026/04/23/how-to-build-an-ai-company-now/</a> </p>

Zero Trust Architecture for Sidecar-Based MCP Servers

  • None
  • Published date: 2026-04-23 00:00:00

None

<p>The post <a href="https://www.gopher.security/blog/zero-trust-architecture-sidecar-mcp-servers">Zero Trust Architecture for Sidecar-Based MCP Servers</a> appeared first on <a href="https://www.gopher.security/blog">Read the Gopher Security's Quantum Safety Blog</a>.</p><h2>The shift toward embodied intelligence in business</h2><p>Ever wonder why most business AI feels like a really smart person trapped in a dark room just shouting answers? It's because we’ve mostly built "brains" that don't have "bodies" to actually do things in the real world. </p><p>When we talk about <strong>embodied intelligence</strong> here, we aren't necessarily talking about shiny metal robots. In a business context, "embodiment" means giving an AI agent digital agency—the ability to interact with and change its environment (like your CRM or cloud infra) rather than just processing text in a vacuum.</p><p>Basically, we are moving from static models—think of a chatbot that just sits there—to <strong>agents</strong> that actually interact with their environment. It’s the difference between reading a book about swimming and actually jumping into the pool to feel the water.</p><ul> <li><strong>Interaction over processing</strong>: Instead of just crunching data, these agents take an action, see what happens, and then adjust. It's a constant loop. </li> <li><strong>The feedback loop</strong>: In healthcare, an AI agent might help manage patient schedules by "feeling" out the urgency of requests rather than just following a rigid script.</li> <li><strong>Context is king</strong>: In retail, embodied intelligence means a system that doesn't just track inventory but predicts foot traffic by observing store layouts in real-time.</li> </ul><p><img decoding="async" src="https://cdn.pseo.one/6867c628b7f8c49dfe17648d/686ef5ab027b1d23f092b447/developing-embodied-intelligence-learning-evolution/mermaid-diagram-1.svg" alt="Diagram 1"></p><p>I've seen so many projects fail because they try to hard-code every single rule. (<a href="https://www.facebook.com/Danmartell/posts/fiverr-ceo-just-sent-his-employees-the-most-brutally-honest-email-ive-seen-from-/1283584809803653/">Fiverr CEO just sent his employees the most brutally honest email I …</a>) It never works because the business world is too messy. To solve this, we use <strong>evolutionary algorithms</strong>—a specific method where you let the system "evolve" its agentic behaviors through trial and error until it finds the most efficient workflow.</p><blockquote> <p>According to <a href="https://aiindex.stanford.edu/report/">Stanford University’s 2024 AI Index Report</a>, the shift toward "agentic" workflows is becoming the new standard for enterprise efficiency.</p> </blockquote><p>In finance, this looks like automated trading bots that don't just follow one strategy. They use those evolutionary methods to compete against each other in simulations, and only the "fittest" code survives to handle real money. It’s survival of the fittest, but for your tech stack.</p><p>Anyway, it's not just about being smart; it’s about being useful. Moving from "thinking" to "doing" is a huge leap for any CEO trying to actually see an ROI.</p><p>Next, we’re gonna dive into the actual "learning" part—how these things get smarter over time without you having to hold their hand.</p><h2>The lifecycle of an evolving AI agent</h2><p>Ever tried teaching a toddler how to use a spoon? It’s a mess of spilled cereal and weird experiments before they actually get it right, and honestly, evolving AI agents aren't much different. They need a safe place to fail where they won't accidentally delete your entire customer database or spend ten grand on ads for a product that doesn't exist yet.</p><p>You can't just throw an agent into the deep end on day one. We use "digital twins" or simulated environments—basically a video game version of your business—where the agent can try things out. If it’s a retail bot, we let it practice on a fake store with fake customers to see if it starts giving away too many discounts.</p><p>Debugging these things is a nightmare because they don't just have "bugs" in the traditional sense; they have "behaviors." When an agent makes a mistake, you have to look back at the training data and the feedback loop to see where it got the wrong idea. It's more like being a psychologist than a coder sometimes.</p><p>For the dev teams, this means moving to a continuous integration model that includes "evals." Every time you update the model, you run it through a battery of tests to make sure it hasn't lost its mind. Gartner mentioned how AI-augmented dev is speeding this up, but you still need a human in the loop to sign off on major changes.</p><p>Once your agent works, you probably want ten more of them, right? But scaling isn't just about copying and pasting code. You need load balancing so one agent doesn't get overwhelmed while the others sit around. If a healthcare agent is handling a spike in appointments, the system needs to spin up more "bodies" instantly.</p><p><img decoding="async" src="https://cdn.pseo.one/6867c628b7f8c49dfe17648d/686ef5ab027b1d23f092b447/developing-embodied-intelligence-learning-evolution/mermaid-diagram-3.svg" alt="Diagram 3"></p><p>Fault tolerance is huge here too. If one agent in a decentralized network crashes, the others need to pick up the slack without missing a beat. It’s about building a flexible architecture that doesn't break when one API call fails. </p><p>Anyway, the goal is to create a system that grows with your business, not one that you have to rebuild every six months. Next, we’re gonna look at the infrastructure you need to actually support these evolving agents.</p><h2>Building the infrastructure for evolving agents</h2><p>Building the "body" for an AI agent is honestly a lot harder than just training a model on some text. You can’t just give a brain a set of eyes and expect it to run a warehouse; you need the pipes, the wires, and the plumbing to make it all talk to each other without crashing.</p><p>If you’re trying to run next-gen agents on a tech stack from 2015, you’re gonna have a bad time. Most legacy systems are like old houses with bad wiring—they just can't handle the load of real-time AI processing. (<a href="https://acuvate.com/blog/legacy-factory-systems-fail-real-time-decisions/">Why Legacy Systems Fail Agentic AI &amp; Real-Time Decisions in 2026</a>) </p><p>Firms like <a href="https://technokeens.com/">Technokeens</a> are solving this "legacy bridge" problem by helping businesses with custom software development and cloud consulting. They specialize in application modernization, which is basically a fancy way of saying they take your old, clunky databases and bridge them to modern API structures so your agent isn't a genius who can't open the door to the room where the data is kept.</p><ul> <li><strong>Cloud-native is the only way</strong>: You need the elasticity of the cloud because agentic workloads spike like crazy when they start "thinking" through a problem.</li> <li><strong>API-first architecture</strong>: If your systems don't talk to each other via clean APIs, your agents will get stuck in silos.</li> <li><strong>Data liquidity</strong>: This isn't just about speed; it's about breaking down silos. Data liquidity means your agents can access cross-departmental info dynamically—like a retail agent seeing logistics delays and marketing budgets at the same time to adjust a promotion.</li> </ul><p>According to a 2023 report by <a href="https://www.gartner.com/en/newsroom/press-releases/2023-10-16-gartner-identifies-the-top-10-strategic-technology-trends-for-2024">Gartner</a>, nearly 25% of CIOs will be looking at "AI-augmented development" to speed up how they build this very infrastructure. </p><p>Once you have more than one agent, things get chaotic fast. It’s like having five interns who don't talk to each other but all have access to your corporate credit card. You need orchestration to make sure they aren't stepping on each others toes.</p><p>!Diagram 2</p><p>Monitoring is the other big piece. You can't just "set it and forget it" because agents can drift. You need dashboards that track not just if the agent is "up," but if it’s actually doing what it’s supposed to do.</p><p>Next, we’re gonna look at security—because giving an agent a body means giving it the power to break things.</p><h2>Security and Identity in the age of AI agents</h2><p>If you give an AI agent your corporate password and it goes rogue, who do you actually blame? It’s a weird question because we're used to securing people, not autonomous "bodies" that can make their own choices at 2 a.m. while we're asleep.</p><p>We can't just treat these agents like another employee with a login. We need a specialized identity and access management (IAM) strategy just for them.</p><ul> <li><strong>Identity for things, not people</strong>: Every agent needs a unique digital identity, almost like a service account but with way more guardrails. </li> <li><strong>RBAC vs ABAC</strong>: Most of us use Role-Based Access Control (RBAC), but for agents, Attribute-Based Access Control (ABAC) is better. For example, access is granted only if the agent's security clearance matches the data's sensitivity tag and the transaction originates from a verified IP.</li> <li><strong>Zero Trust is mandatory</strong>: You gotta assume the agent's API token could get leaked. Implementing zero trust means the agent has to prove its "identity" for every single request.</li> </ul><p>According to the Cybersecurity &amp; Infrastructure Security Agency (CISA), moving toward a zero trust architecture is the only way to handle the "expanding attack surface" created by automated systems. </p><p>Honestly, the scariest part of embodied intelligence is the "black box" problem. If a retail bot decides to discount every item in the store by 90%, you need an audit trail to see why it thought that was a good idea. </p><ul> <li><strong>Logging the "Why"</strong>: Traditional logs show <em>what</em> happened. AI logs need to show the reasoning—the "thought process" behind the action. </li> <li><strong>Compliance on autopilot</strong>: Tools can now automate GDPR and SOC2 compliance by watching agent behavior in real-time. </li> <li><strong>Ethical policies</strong>: You need hard-coded "off switches." In finance, this might be a circuit breaker that stops an agent if it loses a certain amount of money in under a minute.</li> </ul><blockquote> <p>A 2024 report by <a href="https://www.ibm.com/reports/threat-intelligence">IBM</a> highlights that the average cost of a data breach is hitting record highs, making the "security-first" approach for AI agents a business necessity.</p> </blockquote><p>Anyway, if you don't govern these things, they’ll eventually do something "smart" that is actually incredibly stupid for your bottom line. </p><h2>Real world impact and ROI</h2><p>So, we've spent all this time talking about how these agents "think" and "evolve," but let's be real—your boss only cares if it actually moves the needle on the bottom line. It’s easy to get lost in the tech, but the real magic happens when you see the ROI in places you didn't expect, like marketing or operations.</p><p>Measuring success isn't just about counting how many tickets a bot closed; it's about the quality of the "embodied" experience. </p><ul> <li><strong>KPIs that actually matter</strong>: Instead of just speed, look at "frustration scores." If a marketing agent notices a user hovering over a cancel button and offers a personalized discount in real-time, that's a retention win you can actually measure.</li> <li><strong>Resource optimization</strong>: It’s not about replacing people, it’s about shifting costs. If your AI handles the 80% of grunt work, your human team can focus on the 20% that requires actual creativity.</li> <li><strong>Personalization at scale</strong>: I've seen marketing teams use these agents to "feel out" customer sentiment across thousands of touchpoints, adjusting ad spend on the fly.</li> </ul><p>As mentioned earlier, the cost of data breaches is skyrocketing, so part of your ROI is actually "risk avoidance." You're spending money now to make sure you don't lose a fortune later when a dumb bot makes a huge mistake.</p><p><img decoding="async" src="https://cdn.pseo.one/6867c628b7f8c49dfe17648d/686ef5ab027b1d23f092b447/developing-embodied-intelligence-learning-evolution/mermaid-diagram-4.svg" alt="Diagram 4"></p><p>At the end of the day, we're finally giving the "brain in the dark room" a pair of hands and a way to see the world. By moving toward embodied intelligence, businesses stop just shouting answers and start actually solving problems in real-time. If you give these agents the right body, a secure identity, and a safe place to evolve, they stop being a science project and start being the most valuable employees you have. It’s a wild ride, but definitely one worth taking if you want to stay competitive in a world that doesn't slow down.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/zero-trust-architecture-for-sidecar-based-mcp-servers/" data-a2a-title="Zero Trust Architecture for Sidecar-Based MCP Servers"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fzero-trust-architecture-for-sidecar-based-mcp-servers%2F&amp;linkname=Zero%20Trust%20Architecture%20for%20Sidecar-Based%20MCP%20Servers" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fzero-trust-architecture-for-sidecar-based-mcp-servers%2F&amp;linkname=Zero%20Trust%20Architecture%20for%20Sidecar-Based%20MCP%20Servers" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fzero-trust-architecture-for-sidecar-based-mcp-servers%2F&amp;linkname=Zero%20Trust%20Architecture%20for%20Sidecar-Based%20MCP%20Servers" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fzero-trust-architecture-for-sidecar-based-mcp-servers%2F&amp;linkname=Zero%20Trust%20Architecture%20for%20Sidecar-Based%20MCP%20Servers" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fzero-trust-architecture-for-sidecar-based-mcp-servers%2F&amp;linkname=Zero%20Trust%20Architecture%20for%20Sidecar-Based%20MCP%20Servers" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.gopher.security/blog">Read the Gopher Security&amp;#039;s Quantum Safety Blog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Read the Gopher Security's Quantum Safety Blog">Read the Gopher Security's Quantum Safety Blog</a>. Read the original post at: <a href="https://www.gopher.security/blog/zero-trust-architecture-sidecar-mcp-servers">https://www.gopher.security/blog/zero-trust-architecture-sidecar-mcp-servers</a> </p>

How cyberattacks on companies affect everyone

  • None
  • Published date: 2026-04-23 00:00:00

None

<p>The post <a href="https://www.malwarebytes.com/blog/privacy/2026/04/how-cyberattacks-on-companies-affect-everyone">How cyberattacks on companies affect everyone</a> appeared first on <a href="https://www.malwarebytes.com/">Malwarebytes</a>.</p><p>If you use the internet, you’ve likely been affected by cybercrime in some way. Even when an attack is aimed at a company, the fallout usually lands on ordinary people.</p><p>The most obvious harm is stolen data. When attackers break into a business, it is usually customer information that ends up in criminal hands, and that can lead to <a href="https://www.malwarebytes.com/identity-theft" rel="noreferrer noopener">identity theft</a>, <a href="https://www.malwarebytes.com/blog/privacy/2026/03/your-tax-forms-sell-for-20-on-the-dark-web" rel="noreferrer noopener">tax fraud</a>, <a href="https://www.malwarebytes.com/press/2023/11/14/new-credit-card-skimmer-scam" rel="noreferrer noopener">credit card fraud</a>, and a long tail of scam attempts that can continue for months or years. For consumers, the breach itself is often just the start of the cleanup.</p><p>That work is annoying, time-consuming, and sometimes expensive. People may have to freeze credit, replace cards, change passwords, be on the lookout for suspicious transactions, and dispute charges. The Federal Trade Commission (FTC) specifically <a href="https://www.ftc.gov/media/79862" rel="noreferrer noopener nofollow">advises</a> consumers to use <a href="https://www.identitytheft.gov/databreach" rel="noreferrer noopener nofollow">IdentityTheft.gov</a> after a breach and recommends steps like credit freezes and fraud alerts to reduce the chance of further abuse.</p><p>When sensitive data is exposed, the harm is not only financial. Medical, insurance, and other deeply personal records can be used to create more convincing phishing or extortion attempts, and the stress of knowing that private information is circulating among criminals can linger long after the technical incident is over. In other words, breach victims are not just cleaning up a data problem, they are dealing with a loss of trust.</p><hr class="wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide" style="margin-top:var(--wp--preset--spacing--20);margin-bottom:var(--wp--preset--spacing--20)"><div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex"> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:15%"> <figure class="wp-block-image aligncenter size-large is-resized"><img decoding="async" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2024/11/phishing-scam-protection-icon-0B73D5.svg?w=1024" alt="" class="wp-image-120125" style="aspect-ratio:0.7764298093587522;width:65px;height:auto"></figure> </div> <div class="wp-block-column is-vertically-aligned-center is-layout-flow wp-container-core-column-is-layout-10073889 wp-block-column-is-layout-flow" style="padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);flex-basis:60%"> <h3 class="wp-block-heading has-dark-blue-color has-text-color has-link-color wp-elements-d5cba6efaa6cef7ebba002e48b08f869" id="h-breaches-happen-every-day-don-t-be-the-last-to-know"><strong>Breaches happen every day.</strong> Don’t be the last to know.</h3> </div> <div class="wp-block-column is-vertically-aligned-center has-global-padding is-content-justification-right is-layout-constrained wp-container-core-column-is-layout-f1f2ed93 wp-block-column-is-layout-constrained" style="flex-basis:30%"> <div class="wp-block-malware-bytes-button mb-button" id="mb-button-a2b2e60f-b6c4-45fc-8aac-20ae3cf27e09"> <div class="mb-button__row u-justify-content-center"> <div class="mb-button__item mb-button-item-0"> <p class="btn-main"><a href="https://www.malwarebytes.com/identity-theft-protection" data-type="link" data-id="https://www.malwarebytes.com/scamguard" rel="noreferrer noopener">SEE PLANS</a></p> </div> </div> </div> </div> </div><hr class="wp-block-separator aligncenter has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide" style="margin-top:var(--wp--preset--spacing--20);margin-bottom:var(--wp--preset--spacing--20)"><p>Cybercrime also hits consumers through service disruption. Ransomware and intrusion campaigns can interrupt payment systems, telecom services, shipping, energy distribution, booking platforms, and other infrastructure people rely on every day. In those cases, the consumer impact is immediate: you may not be able to pay, travel, call, buy, or even work normally. The <a href="https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents">CSIS timeline</a> and <a href="https://www.cyber.gc.ca/en/guidance/national-cyber-threat-assessment-2025-2026">Canada’s cyberthreat assessment</a> both show that these disruptions are increasingly tied to high-value targets and can be part of broader state or criminal campaigns.</p><p>Not all these incidents are driven by cybercriminals. Recently, Britain’s cybersecurity chief warned that the <a href="https://therecord.media/UK-cyberattacks-ncsc-china" rel="noreferrer noopener nofollow">UK is handling 4 nationally significant cyberincidents every week</a>, with the majority now traced back to foreign governments rather than cybercriminal groups.</p><p>Another cost is easy to overlook: disinformation and confusion. When attackers steal data, disrupt services, or impersonate trusted brands, they can also flood the public with fake support messages, scam calls, refund schemes, and phishing emails pretending to be the breached company. The breach becomes a launchpad for more fraud, and consumers are left trying to separate legitimate notifications from those sent by attackers.</p><p>Then there is the security backlash. After a breach, companies usually tighten access rules, add more multi-factor authentication prompts, force reauthentication, shorten sessions, and increase fraud checks. Those measures are often necessary, but they also make ordinary digital life more cumbersome. The consumer ends up paying with time and frustration for security problems they did not create.</p><p>That is why company-targeted cybercrime is not really only a business problem. It is a consumer issue, a public-trust issue, and sometimes even a national security issue. A single breach can leak data, trigger fraud, interrupt essential services, amplify scams, and make using the internet more frustrating for everyone else. The real cost is rarely confined to the company that got hit.</p><p>Knowing this, it’s worth thinking carefully about which companies to trust with your data and how much you’re willing to share . You cannot stop every attack against every company you deal with, but you can limit the fallout by being more selective. Some considerations:</p><ul class="wp-block-list"> <li>Do they need all the information they are asking for?</li> <li>Would it hurt anything if you leave some fields blank or give less specific answers?</li> <li>Has this company been breached in the past, and how did they handle it?</li> <li>How long will they store the data you provide?</li> <li>Can you easily have your data removed at your request?</li> </ul><hr class="wp-block-separator has-alpha-channel-opacity is-style-wide"><p><strong>Your name, address, and phone number are probably already for sale. </strong> </p><p>Data brokers collect and sell your personal details to anyone willing to pay. Malwarebytes Personal Data Remover finds them and gets your information removed, then keeps watch so it stays that way.  </p><div class="wp-block-malware-bytes-button mb-button" id="mb-button-9fb76ce6-e9be-4800-a515-474eb985c2be"> <div class="mb-button__row u-justify-content-flex-start"> <div class="mb-button__item mb-button-item-0"> <p class="btn-main"><a href="https://www.malwarebytes.com/personal-data-remover"></a><a style="letter-spacing: -0.3px;display: inline !important" href="https://www.malwarebytes.com/personal-data-remover" rel="noreferrer noopener">SCAN NOW</a><a href="https://www.malwarebytes.com/personal-data-remover" rel="noreferrer noopener"></a></p> </div> </div> </div><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/how-cyberattacks-on-companies-affect-everyone/" data-a2a-title="How cyberattacks on companies affect everyone"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-cyberattacks-on-companies-affect-everyone%2F&amp;linkname=How%20cyberattacks%20on%20companies%20affect%20everyone" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-cyberattacks-on-companies-affect-everyone%2F&amp;linkname=How%20cyberattacks%20on%20companies%20affect%20everyone" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-cyberattacks-on-companies-affect-everyone%2F&amp;linkname=How%20cyberattacks%20on%20companies%20affect%20everyone" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-cyberattacks-on-companies-affect-everyone%2F&amp;linkname=How%20cyberattacks%20on%20companies%20affect%20everyone" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fhow-cyberattacks-on-companies-affect-everyone%2F&amp;linkname=How%20cyberattacks%20on%20companies%20affect%20everyone" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.malwarebytes.com/">Malwarebytes</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Malwarebytes">Malwarebytes</a>. Read the original post at: <a href="https://www.malwarebytes.com/blog/privacy/2026/04/how-cyberattacks-on-companies-affect-everyone">https://www.malwarebytes.com/blog/privacy/2026/04/how-cyberattacks-on-companies-affect-everyone</a> </p>

When Mythos Finds Thousands of Zero-Days, EU Regulators Won’t Wait for Your SOC to Catch Up

  • None
  • Published date: 2026-04-23 00:00:00

None

<p>Mythos vulnerability findings are coming, thousands of them, all at once. When they arrive, your organization’s incident response clock starts immediately. If you’re subject to <a href="https://d3security.com/glossary/nis2-directive/" type="page" id="61361">NIS2</a>, <a href="https://d3security.com/glossary/mythos-nis2/" type="page" id="61444">CRA</a>, or <a href="https://d3security.com/glossary/dora-compliance/" type="page" id="59785">DORA</a> regulations, the compliance deadline is 24 hours, 4 hours, or, in the case of daily penalty accrual, effectively right now. A 10-analyst SOC can process roughly 320 findings in 24 hours. Mythos will likely generate far more than that in a single disclosure event. For EU-regulated organizations, this gap between Mythos scale and manual triage capacity is a compliance failure waiting to happen.</p><p>Every Mythos finding is a regulatory event. Organizations that attempt to manage Mythos findings using traditional vulnerability workflows will miss deadlines, trigger penalties, and expose leadership to personal liability. Regulators care about your response time.</p><p><a href="https://d3security.com/resources/mythos-whitepaper/" type="d3-resource" id="61458">Mythos</a> finds the zero-days. The real question is whether your organization can <em>classify, report, and act</em> on thousands of findings before the compliance deadline clock expires, for three separate regulatory frameworks simultaneously.</p><hr class="wp-block-separator has-alpha-channel-opacity"><h2 class="wp-block-heading">The Regulatory Triple Threat</h2><p>For EU-regulated organizations, Mythos findings activate multiple compliance obligations in parallel:</p><h3 class="wp-block-heading">NIS2 (<a href="https://eur-lex.europa.eu/eli/dir/2022/2555" rel="noreferrer noopener">Directive 2022/2555</a>)</h3><ul class="wp-block-list"> <li>24-hour early warning to national authority for “significant incidents”</li> <li>72-hour assessment and full incident report</li> <li>€10M penalty cap (or 2% of global turnover, whichever is higher)</li> <li>Personal liability for board members and C-suite</li> </ul><h3 class="wp-block-heading"><a href="https://digital-strategy.ec.europa.eu/en/policies/cyber-resilience-act" rel="noreferrer noopener">CRA (Cyber Resilience Act</a>, effective 2025)</h3><ul class="wp-block-list"> <li>24-hour notification to <a href="https://www.enisa.europa.eu/" rel="noreferrer noopener">ENISA</a> for findings affecting products in scope</li> <li>Product remediation on an accelerated timeline</li> <li>€15M penalty for non-compliance</li> <li>Risk of product recall from EU markets</li> </ul><h3 class="wp-block-heading">DORA (<a href="https://eur-lex.europa.eu/eli/reg/2022/2554" rel="noreferrer noopener">Digital Operational Resilience Act</a>, effective 2025)</h3><ul class="wp-block-list"> <li>4-hour initial incident report to authorities</li> <li>Continues daily for active incidents</li> <li>Daily penalty accrual: up to €10M/day for large financial institutions</li> <li>Escalation triggers within hours (not days)</li> </ul><p>A single Mythos finding affecting a cloud service used by regulated organizations can activate all three frameworks simultaneously. Each has its own classification criteria, reporting timeline, and evidence requirements. Your compliance team may not even agree on which regulation takes priority.</p><hr class="wp-block-separator has-alpha-channel-opacity"><h2 class="wp-block-heading">The Math That Breaks Manual Triage</h2><p>The arithmetic is straightforward. It’s also unforgiving.</p><p>A single Mythos disclosure event is expected to surface hundreds to thousands of novel vulnerabilities. Conservative estimates put the number at 500+ findings in a single batch. At 30 minutes per finding for proper triage, assessment, and initial reporting, a reasonable estimate for analyst-driven work, that’s 250 analyst-hours of effort.</p><p>A 10-person security team working an incident has <a href="https://d3security.com/resources/ai-alert-triage-siem-false-positives/" type="d3-resource" id="59893">capacity</a> for roughly:</p><ul class="wp-block-list"> <li>80 findings processed in 4 hours (DORA deadline)</li> <li>320 findings processed in 24 hours (NIS2 deadline)</li> </ul><p>Real-world triage speeds decline as incident workload increases. Context switching, stakeholder coordination, and regulatory documentation overhead further compress available time.</p><p><strong>The outcome:</strong> Organizations with typical SOC capacity will miss DORA deadlines 84% of the time and NIS2 deadlines 36% of the time.</p><p>Under DORA’s penalty framework, a €1B-turnover financial organization incurs €10M/day for every day the initial incident remains unclassified. For a 500-finding event processed at human speed, that penalty can exceed €50M before the backlog clears.</p><p>Manual triage is financially insolvent.</p><p>And Mythos won’t be the only source. OpenAI’s <a href="https://openai.com/index/codex-security-now-in-research-preview/" rel="noreferrer noopener">Codex Security</a> launched in March 2026, scanning 1.2 million commits in 30 days and surfacing over 10,000 high-severity findings. Each AI-discovered vulnerability triggers the same NIS2, CRA, and DORA reporting obligations. The compliance math only gets worse. Dedicated analysis of Codex Security’s regulatory impact is forthcoming.</p><hr class="wp-block-separator has-alpha-channel-opacity"><h2 class="wp-block-heading">Why This Is Different From Standard Vulnerability Management</h2><p>Your organization already has a vulnerability management program. That program exists to handle CVEs, pre-published, catalogued, and arriving in a measured cadence. Mythos findings break that model.</p><p>EU regulatory frameworks were designed for human-speed disclosure cycles. A vendor publishes a CVE. Your team reads the advisory. Your team checks if you’re affected. You patch or mitigate. The regulatory clock is generous because disclosure has guardrails.</p><p>Mythos findings arrive without guardrails. They’re also richer than CVEs. Each finding includes code-level analysis, verified exploitation steps, contextual severity assessment, and affected version ranges. They’re actionable proof of concept that your systems are vulnerable.</p><p>More critically, the regulatory overlap creates parallel reporting chains. A finding affecting your in-house cloud platform may trigger:</p><ul class="wp-block-list"> <li>An NIS2 “significant incident” classification (requires authority notification)</li> <li>A CRA product recall assessment (requires ENISA notification)</li> <li>A DORA incident report (requires financial regulator notification)</li> </ul><p>Each classification follows different criteria. Each requires separate evidence chains. Each has its own timeline.</p><p>Traditional vulnerability management tools classify based on CVSS score. Regulators classify based on business impact, scope of exposure, and regulatory jurisdiction. The two taxonomies don’t align. Manual work is required to bridge the gap.</p><p>At scale, that work becomes impossible in the time available.</p><hr class="wp-block-separator has-alpha-channel-opacity"><h2 class="wp-block-heading">How Morpheus AI Closes the Compliance Gap</h2><p>Morpheus AI is built to process vulnerability findings at analyst depth, across multiple findings, in parallel, without human bottlenecks.</p><p><strong>Processes 100% of Mythos findings at <a href="https://d3security.com/morpheus/triage/" type="page" id="54737">L2+ analyst depth</a>.</strong> Morpheus ingests raw finding data and executes the same analysis your most experienced analysts perform: asset identification, business context lookup, exploit validation, scope assessment, and regulatory classification. It processes hundreds of findings simultaneously while your team focuses on decision-making and response execution.</p><p><strong>Auto-classifies against NIS2/CRA/DORA criteria in a single pass.</strong> Each finding is assessed against the classification criteria for all three frameworks. Morpheus determines whether each finding qualifies as a “significant incident” under NIS2, triggers CRA notification obligations, or requires DORA reporting. The output is a structured classification that maps to your regulatory reporting workflows.</p><p><strong><a href="https://d3security.com/resources/contextual-playbook-generation/" type="d3-resource" id="59300">Contextual playbook generation</a> produces regulation-specific reports.</strong> Morpheus generates findings summaries tailored to each regulatory audience. The NIS2 report includes business impact and authority-facing language. The CRA report emphasizes product scope and remediation timeline. The DORA report prioritizes timeline and escalation criteria. The same underlying finding produces three regulatory reports without duplication of effort.</p><p><strong><a href="https://d3security.com/morpheus/investigation/" type="page" id="54727">Attack path discovery</a> determines impact scope for all three frameworks.</strong> Mythos findings identify vulnerabilities. Morpheus maps the attack paths those vulnerabilities enable. It determines whether exposure is customer-facing, internal-only, or requires chain exploitation. That impact scope determines regulatory classification and penalty risk.</p><p><strong>800+ <a href="https://d3security.com/morpheus/self-healing-integrations/" type="page" id="58808">self-healing integrations</a> connect to CSIRT/ENISA submission systems.</strong> Once Morpheus classifies a finding and generates the required report, it submits findings to national authorities, ENISA, and financial regulators through existing submission APIs. The human team receives a summary and escalation points, not a to-do list.</p><p><strong><a href="https://d3security.com/resources/dora-compliance-on-autopilot/" type="d3-resource" id="59293">Full audit trail</a> serves as evidence chain for regulators.</strong> Regulatory investigations examine your incident response decisions. Morpheus maintains a timestamped, immutable record of classification decisions, report generation, and submission timing. That record demonstrates compliance with regulatory timelines and decision quality.</p><hr class="wp-block-separator has-alpha-channel-opacity"><h2 class="wp-block-heading">A Readiness Framework for EU-Regulated Organizations</h2><p>Preparing for Mythos disclosure requires moving beyond traditional vulnerability management. Here’s a phased approach to compliance readiness:</p><h3 class="wp-block-heading">Phase 1: Assess</h3><ul class="wp-block-list"> <li>Map which regulations apply to your organization and products</li> <li>Audit current SOC capacity and triage timelines</li> <li>Identify gaps between current response speed and regulatory deadlines</li> <li>Catalog critical assets and their regulatory scope</li> </ul><h3 class="wp-block-heading">Phase 2: Deploy</h3><ul class="wp-block-list"> <li>Activate <a href="https://d3security.com/ai-soc-platform/" type="page" id="60708">Morpheus AI</a> with NIS2, CRA, and DORA compliance playbooks</li> <li>Configure connections to regulatory submission systems</li> <li>Establish stakeholder workflows for findings that require business decision-making</li> <li>Test compliance reporting with simulated vulnerability scenarios</li> </ul><h3 class="wp-block-heading">Phase 3: Validate</h3><ul class="wp-block-list"> <li>Execute tabletop exercises using realistic Mythos-scale scenarios</li> <li>Verify that regulatory reporting completes within required timelines</li> <li>Audit evidence trails and documentation quality</li> <li>Refine playbooks based on test results</li> </ul><p>Organizations that complete this framework before Mythos arrives will meet compliance deadlines. Organizations that don’t won’t.</p><hr class="wp-block-separator has-alpha-channel-opacity"><blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"> <p><strong>Pre-Release Advisory:</strong> Mythos has not yet reached general availability. Morpheus AI currently processes vulnerability reports from production scanners. The capabilities described reflect existing architecture applied to expected Mythos data structures. Deep Mythos integration is on D3’s roadmap.</p> </blockquote><hr class="wp-block-separator has-alpha-channel-opacity"><h2 class="wp-block-heading">Related Resources</h2><ul class="wp-block-list"> <li><a href="https://d3security.com/resources/mythos-whitepaper/" type="d3-resource" id="61458">The Mythos Problem: 10,000 Zero-Days and the SOC That Can’t Keep Up</a></li> <li><a href="https://d3security.com/resources/mythos-nis2-eu-compliance/" type="d3-resource" id="61451">Mythos NIS2 Whitepaper</a></li> <li><a href="https://d3security.com/resources/nis2-compliance-for-the-ai-soc/" type="d3-resource" id="61311">NIS2 Compliance for the AI SOC</a></li> <li><a href="https://d3security.com/resources/mythos-eu-regulatory-comparison/" type="d3-resource" id="61474">EU Regulatory Comparison</a></li> <li><a href="https://d3security.com/solutions/autonomous-mythos-response/" type="page" id="61439">Autonomous Mythos Response</a></li> <li><a href="https://d3security.com/solutions/mythos-eu-ciso/" type="page" id="61441">Mythos Vulnerability Triage for EU CISOs</a></li> <li><a href="https://d3security.com/blog/nis2-soc-audit-readiness-2026/" type="post" id="61362">Belgium’s NIS2 Audit Window Opens April 18, 2026</a></li> <li><a href="https://d3security.com/faq/mythos-eu-compliance/" type="page" id="61521">EU FAQ</a></li> </ul><hr class="wp-block-separator has-alpha-channel-opacity"><p>The post <a href="https://d3security.com/blog/mythos-nis2-cra-dora-compliance/">When Mythos Finds Thousands of Zero-Days, EU Regulators Won’t Wait for Your SOC to Catch Up</a> appeared first on <a href="https://d3security.com/">D3 Security</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/when-mythos-finds-thousands-of-zero-days-eu-regulators-wont-wait-for-your-soc-to-catch-up/" data-a2a-title="When Mythos Finds Thousands of Zero-Days, EU Regulators Won’t Wait for Your SOC to Catch Up"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhen-mythos-finds-thousands-of-zero-days-eu-regulators-wont-wait-for-your-soc-to-catch-up%2F&amp;linkname=When%20Mythos%20Finds%20Thousands%20of%20Zero-Days%2C%20EU%20Regulators%20Won%E2%80%99t%20Wait%20for%20Your%20SOC%20to%20Catch%20Up" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhen-mythos-finds-thousands-of-zero-days-eu-regulators-wont-wait-for-your-soc-to-catch-up%2F&amp;linkname=When%20Mythos%20Finds%20Thousands%20of%20Zero-Days%2C%20EU%20Regulators%20Won%E2%80%99t%20Wait%20for%20Your%20SOC%20to%20Catch%20Up" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhen-mythos-finds-thousands-of-zero-days-eu-regulators-wont-wait-for-your-soc-to-catch-up%2F&amp;linkname=When%20Mythos%20Finds%20Thousands%20of%20Zero-Days%2C%20EU%20Regulators%20Won%E2%80%99t%20Wait%20for%20Your%20SOC%20to%20Catch%20Up" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhen-mythos-finds-thousands-of-zero-days-eu-regulators-wont-wait-for-your-soc-to-catch-up%2F&amp;linkname=When%20Mythos%20Finds%20Thousands%20of%20Zero-Days%2C%20EU%20Regulators%20Won%E2%80%99t%20Wait%20for%20Your%20SOC%20to%20Catch%20Up" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhen-mythos-finds-thousands-of-zero-days-eu-regulators-wont-wait-for-your-soc-to-catch-up%2F&amp;linkname=When%20Mythos%20Finds%20Thousands%20of%20Zero-Days%2C%20EU%20Regulators%20Won%E2%80%99t%20Wait%20for%20Your%20SOC%20to%20Catch%20Up" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://d3security.com/">D3 Security</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by D3 Security">D3 Security</a>. Read the original post at: <a href="https://d3security.com/blog/mythos-nis2-cra-dora-compliance/">https://d3security.com/blog/mythos-nis2-cra-dora-compliance/</a> </p>

Bitwarden CLI Compromise Linked to Ongoing Checkmarx Supply Chain Campaign

  • Jeffrey Burt
  • Published date: 2026-04-23 00:00:00

None

<p>The command line interface (CLI) of the popular Bitwarden open source password manager is the latest target of the ongoing Checkmarx supply chain campaign, with a threat group hijacking an npm package and injecting malicious code designed to steal sensitive data from developer workstations and CLI environments.</p><p>Threat researchers from a number of cybersecurity vendors, including Socket, Ox Security, JFrog Security, and StepSecurity, detected and identified the compromised Bitwarden CLI version 2026.4.0, with the bad actors targeting it after <a href="https://socket.dev/blog/bitwarden-cli-compromised" target="_blank" rel="noopener">abusing a GitHub Action</a> within Bitwarden’s CI/CD pipeline, according to the Socket Research Team.</p><p>The pattern was consistent with what was seen in other targeted repositories in the Checkmarx campaign, the researchers <a href="https://socket.dev/blog/bitwarden-cli-compromised" target="_blank" rel="noopener">wrote in a report</a>.</p><p>The attack was also another example of the increasing <a href="https://devops.com/critical-microsoft-github-flaw-highlights-dangers-to-ci-cd-pipelines-tenable/" target="_blank" rel="noopener">cybersecurity risks to CI/CD architectures</a> as they become more foundational in the software development pipeline and threat actors expand their targeting of them in such supply chain attacks.</p><h3>A Popular Password Manager</h3><p>The Bitwarden password manager is used by more than 10 million people and more than 50,000 businesses, they wrote, adding that it ranks among the <a href="https://ramp.com/vendors/bitwarden" target="_blank" rel="noopener">top three password managers</a> adopted by enterprises, they wrote, making it an attractive target for TeamPCP.</p><p>According to JFrog security researcher Meiter Palas, the package dropped by the attackers keeps the Bitwarden metadata intact but rewires the preinstall and the CLI to a custom loader rather than the legitimate one.</p><p>“The loader downloads the bun runtime from GitHub if it is not already present, then launches a large obfuscated JavaScript payload,” Palas <a href="https://research.jfrog.com/post/bitwarden-cli-hijack/" target="_blank" rel="noopener">wrote in a report</a>. “Once deobfuscated, that payload reveals a broad credential theft operation focused on developer workstations and CI environments: GitHub and npm tokens, SSH material, shell history, AWS [Amazon Web Services], GCP [Google Cloud Platform], and Azure secrets, GitHub Actions secrets, and AI tooling configuration files are all targeted.”</p><h3>Targeting AI Tools</h3><p>Sai Likhith, a software engineer with StepSecurity, <a href="https://www.stepsecurity.io/blog/bitwarden-cli-hijacked-on-npm-bun-staged-credential-stealer-targets-developers-github-actions-and-ai-tools" target="_blank" rel="noopener">wrote</a> that the Bitwarden case “is the first npm compromise we have analyzed that explicitly enumerates Claude Code, Cursor, Kiro, Codex CLI, and Aider, treating ~/.claude.json and MCP server configs as first-class exfiltration targets alongside cloud and source control secrets.”</p><p>Stolen data is encrypted with AES-256-GCM and exfiltrated to audit.checkmarx.cx, a registered domain used to impersonate Checkmarx so that the outbound connection would blend in with security telemetry, making it more difficult for it to be detected, Likhith wrote. If a valid GitHub token was found, the malware was weaponized so it would enumerate repositories, steal Actions secrets, and inject malicious workflows into the repositories the token could reach, “turning a single compromised developer machine into a broader supply chain pivot point,” he wrote.</p><h3>Bitwarden Shuts It Down</h3><p>Bitwarden <a href="https://community.bitwarden.com/t/bitwarden-statement-on-checkmarx-supply-chain-incident/96127" target="_blank" rel="noopener">acknowledged</a> the malicious package, saying its security team identified and contained it and that it was distributed for a little more than 90 minutes April 22, adding that the attack was in connection with the broader Checkmarx incident.</p><p>The company wrote that there was no evidence found to suggest that data in end users’ vaults was accessed or that production or production systems were compromised. Once detected, the compromised access was revoked, the malicious npm was deprecated, and remediation steps were put into place.</p><p>The <a href="https://devops.com/sophisticated-supply-chain-attack-targeting-trivy-expands-to-checkmarx-litellm/" target="_blank" rel="noopener">ongoing supply chain campaign</a> has been underway for more than a month, with TeamPCP compromising <a href="https://www.aquasec.com/blog/trivy-supply-chain-attack-what-you-need-to-know/" target="_blank" rel="noopener">Aqua Security’s Trivy</a> open source security vulnerability scanner and associated GitHub Actions in March and then expanding later in the month to Checkmarx and LiteLLM.</p><h3>Attribution is Difficult</h3><p>Socket researchers saw overlaps – such as shared tools – in both the Checkmarx attack and the targeting of Bitwarden, adding that it “strongly suggests connection to the same malware ecosystem.” That said, attribution is complicated by differences in operational signatures. The attack on Checkmarx was claimed by TeamPCP on a particular social media account after it was discovered. In addition, the malware itself tried to blend in with seemingly legitimate connections, they wrote.</p><p>“This payload takes a different approach: the ideological branding is embedded directly in the malware, from the Shai-Hulud repository names to the ‘Butlerian Jihad’ manifesto payload to commit messages proclaiming resistance against machines,” Socket researchers wrote. “This suggests either a different operator using shared infrastructure, a splinter group with stronger ideological motivations, or an evolution in the campaign’s public posture.”</p><p>Ox Security researchers also <a href="https://www.ox.security/blog/shai-hulud-bitwarden-cli-supply-chain-attack/" target="_blank" rel="noopener">highlighted</a> the Shai-Hulud connection, noting that the string “Shai-Hulud: The Third Coming” was embedded in the Bitwarden package, writing that it indicates that “this is likely the next phase of the Shai-Hulud saga.”</p><p>The <a href="https://securityboulevard.com/2025/11/the-latest-shai-hulud-malware-is-faster-and-more-dangerous/" target="_blank" rel="noopener">self-propagating worm</a> emerged last year, running through npm repositories in information-stealing supply chain attacks late last year.</p><p>“Shai-Hulud is one of many supply chain attacks occurring in 2026, and this trend shows no signs of slowing as threat actors accumulate more credentials and compromise more developers,” the Ox Security researchers wrote. “Large-scale attacks through the NPM and PyPI registries could be avoided if stronger code review and guardrails were added during the package upload process. Failing to do so will only keep the door open for the next supply chain attack.”</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/bitwarden-cli-compromise-linked-to-ongoing-checkmarx-supply-chain-campaign/" data-a2a-title="Bitwarden CLI Compromise Linked to Ongoing Checkmarx Supply Chain Campaign"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbitwarden-cli-compromise-linked-to-ongoing-checkmarx-supply-chain-campaign%2F&amp;linkname=Bitwarden%20CLI%20Compromise%20Linked%20to%20Ongoing%20Checkmarx%20Supply%20Chain%20Campaign" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbitwarden-cli-compromise-linked-to-ongoing-checkmarx-supply-chain-campaign%2F&amp;linkname=Bitwarden%20CLI%20Compromise%20Linked%20to%20Ongoing%20Checkmarx%20Supply%20Chain%20Campaign" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbitwarden-cli-compromise-linked-to-ongoing-checkmarx-supply-chain-campaign%2F&amp;linkname=Bitwarden%20CLI%20Compromise%20Linked%20to%20Ongoing%20Checkmarx%20Supply%20Chain%20Campaign" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbitwarden-cli-compromise-linked-to-ongoing-checkmarx-supply-chain-campaign%2F&amp;linkname=Bitwarden%20CLI%20Compromise%20Linked%20to%20Ongoing%20Checkmarx%20Supply%20Chain%20Campaign" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbitwarden-cli-compromise-linked-to-ongoing-checkmarx-supply-chain-campaign%2F&amp;linkname=Bitwarden%20CLI%20Compromise%20Linked%20to%20Ongoing%20Checkmarx%20Supply%20Chain%20Campaign" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

Why Chrome Zero-Days Keep Winning and What Enterprises Need to Change – Blog | Menlo Security

  • None
  • Published date: 2026-04-23 00:00:00

None

<p>The post <a href="https://www.menlosecurity.com/blog/why-chrome-zero-days-keep-winning-and-what-enterprises-need-to-change">Why Chrome Zero-Days Keep Winning and What Enterprises Need to Change – Blog | Menlo Security</a> appeared first on <a href="https://www.menlosecurity.com">Menlo Security Blog</a>.</p><p>Fourth Chrome zero-day of 2026 exposes a bigger issue: patching is too slow. Learn why browser isolation is key to preventing modern attacks. </p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/why-chrome-zero-days-keep-winning-and-what-enterprises-need-to-change-blog-menlo-security/" data-a2a-title="Why Chrome Zero-Days Keep Winning and What Enterprises Need to Change – Blog | Menlo Security"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhy-chrome-zero-days-keep-winning-and-what-enterprises-need-to-change-blog-menlo-security%2F&amp;linkname=Why%20Chrome%20Zero-Days%20Keep%20Winning%20and%20What%20Enterprises%20Need%20to%20Change%20%E2%80%93%20Blog%20%7C%20Menlo%20Security" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhy-chrome-zero-days-keep-winning-and-what-enterprises-need-to-change-blog-menlo-security%2F&amp;linkname=Why%20Chrome%20Zero-Days%20Keep%20Winning%20and%20What%20Enterprises%20Need%20to%20Change%20%E2%80%93%20Blog%20%7C%20Menlo%20Security" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhy-chrome-zero-days-keep-winning-and-what-enterprises-need-to-change-blog-menlo-security%2F&amp;linkname=Why%20Chrome%20Zero-Days%20Keep%20Winning%20and%20What%20Enterprises%20Need%20to%20Change%20%E2%80%93%20Blog%20%7C%20Menlo%20Security" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhy-chrome-zero-days-keep-winning-and-what-enterprises-need-to-change-blog-menlo-security%2F&amp;linkname=Why%20Chrome%20Zero-Days%20Keep%20Winning%20and%20What%20Enterprises%20Need%20to%20Change%20%E2%80%93%20Blog%20%7C%20Menlo%20Security" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fwhy-chrome-zero-days-keep-winning-and-what-enterprises-need-to-change-blog-menlo-security%2F&amp;linkname=Why%20Chrome%20Zero-Days%20Keep%20Winning%20and%20What%20Enterprises%20Need%20to%20Change%20%E2%80%93%20Blog%20%7C%20Menlo%20Security" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.menlosecurity.com">Menlo Security Blog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Menlo Security Blog">Menlo Security Blog</a>. Read the original post at: <a href="https://www.menlosecurity.com/blog/why-chrome-zero-days-keep-winning-and-what-enterprises-need-to-change">https://www.menlosecurity.com/blog/why-chrome-zero-days-keep-winning-and-what-enterprises-need-to-change</a> </p>

Copperhelm Emerges to Launch Autonomous Cloud Security Platform

  • Michael Vizard
  • Published date: 2026-04-23 00:00:00

None

<p>Copperhelm today emerged from stealth to launch a platform that aggregates cloud security data to enable its artificial intelligence (AI) agents to autonomously monitor cloud environments, investigate threats and automatically remediate issues in real-time.</p><p>Fresh off raising $7 million in funding, Copperhelm CEO Shimon Tolts said the company has developed a Context Lake that normalizes cloud security data in a way that enables AI agents to perform those tasks. The Copperhelm platform includes specialized AI agents that perform network analysis, analyze system behavior, simulate attacks and automatically mitigate issues. The Copperhelm agents connect directly to live workloads, inspect active processes and container images, map cloud network topology and deploy, for example, a web application firewall (WAF) if needed, without any downtime being required.</p><p>In general, cloud computing environments are highly complex and fragmented, making it difficult for AI tools to access and understand the context needed to ensure security is maintained. In organizations that have hundreds of cloud accounts, there needs to be a context engine that organizes all the metadata and configuration information that enables an AI agent to perform specific security tasks, said Tolts.</p><p>Armed with those insights, it then becomes possible to deploy a series of AI agents that collaboratively perform security functions spanning discovery to remediation, noted Tolts. That closed-loop approach makes it possible to manage cloud security at the level of scale that will be required to cope with the tsunami of vulnerabilities that will be discovered in the AI era, he added.</p><p>That tsunami is being driven first by AI coding tools that are generating more vulnerabilities faster than ever and more advanced AI models that are <a href="https://securityboulevard.com/2026/04/the-day-the-security-music-died/" target="_blank" rel="noopener">capable of discovering what are likely to become thousands of new zero-day vulnerabilities in existing legacy systems</a>. Once discovered, it now takes less than a day for cybercriminals using AI tools to create an exploit, noted Tolts.</p><p>While humans will still be needed to supervise AI agents, it’s not going to be feasible for cybersecurity teams to respond to issues that are occurring with greater frequency at machine speed. In effect, cybersecurity teams are now caught up in an AI arms race they can only win by investing more in AI to thwart cyberattacks that, thanks to AI, are only going to increase in volume and sophistication, said Tolts.</p><p>The challenge, of course, is explaining to business and IT leaders why the bulk of previous cybersecurity investments are rapidly becoming obsolete. While the total cost of cybersecurity might decline in the age of AI as more functions are automated, there is still going to be a need for an initial investment in new tools and platforms.</p><p>Hopefully, AI will benefit defenders more than attackers, but in the meantime, cybersecurity is in a state of flux. Unfortunately, it may yet require a few high-profile cyberattacks enabled by AI to occur before business leaders fully appreciate how the scope of threats facing the organization has fundamentally been forever changed.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/copperhelm-emerges-to-launch-autonomous-cloud-security-platform/" data-a2a-title="Copperhelm Emerges to Launch Autonomous Cloud Security Platform"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fcopperhelm-emerges-to-launch-autonomous-cloud-security-platform%2F&amp;linkname=Copperhelm%20Emerges%20to%20Launch%20Autonomous%20Cloud%20Security%20Platform" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fcopperhelm-emerges-to-launch-autonomous-cloud-security-platform%2F&amp;linkname=Copperhelm%20Emerges%20to%20Launch%20Autonomous%20Cloud%20Security%20Platform" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fcopperhelm-emerges-to-launch-autonomous-cloud-security-platform%2F&amp;linkname=Copperhelm%20Emerges%20to%20Launch%20Autonomous%20Cloud%20Security%20Platform" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fcopperhelm-emerges-to-launch-autonomous-cloud-security-platform%2F&amp;linkname=Copperhelm%20Emerges%20to%20Launch%20Autonomous%20Cloud%20Security%20Platform" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fcopperhelm-emerges-to-launch-autonomous-cloud-security-platform%2F&amp;linkname=Copperhelm%20Emerges%20to%20Launch%20Autonomous%20Cloud%20Security%20Platform" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>