Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Researchers Uncover ProxySmart Software Powering 90+ SIM Farms

April 22, 2026

CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software

April 22, 2026

AI Agents Cause Cybersecurity Incidents at Two Thirds of Firms

April 22, 2026
Facebook X (Twitter) Instagram
Wednesday, April 22
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»AI Agents Cause Cybersecurity Incidents at Two Thirds of Firms
News

AI Agents Cause Cybersecurity Incidents at Two Thirds of Firms

Team-CWDBy Team-CWDApril 22, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Two thirds of organizations have suffered from a cybersecurity incident related to the deployment of AI agents during the last year, research by the Cloud Security Alliance (CSA) has warned.

According to research, conducted alongside Token Security, unchecked AI agents operating on corporate networks caused damage including data exposure, operational disruption and financial losses.

The CSA paper, titled Autonomous but Not Controlled: AI Agent Incidents Now Common in Enterprises, published on April 21, warned that the majority of organizations have no strategy set up around decommissioning AI agents, further putting them at risk of cybersecurity incidents.

According to the report, 68% of respondents claim to have high confidence in the visibility of AI agents on their network. However, 82% of all respondents said they have discovered previously unknown agents in the past year.

The most common places for previously unknown AI agents to be discovered were within internal automation environments and large language model (LLM) platforms.

“This gap highlights a distinction between operational visibility and complete governance assurance, limiting the effectiveness of control models that depend on known and bounded agents,” said the CSA report.

If cybersecurity and infrastructure teams are unaware of AI agents which employees have deployed in the network, this makes it almost impossible to ensure those AI agents are deployed securely. This has already resulted in cybersecurity incidents.

AI Agents Cause Data Breaches and Operational Disruption

During the last twelve months, 65% of organizations have experienced at least one cybersecurity incident which occurred because of the use of AI agents, the research found.

The operational consequences of AI agent related security incidents included data exposure (61%), operational disruption (43%) or unintended actions in business processes (41%).

Just over a third of organizations (35%) said that a security incident as a result of actions by an AI agent resulted in financial losses, while 31% experienced delays in customer-facing or internal services.

The paper warned that AI agent incidents are already affecting core enterprise functions, including data protection, operational continuity, financial performance, and service delivery. Businesses must ensure that they are performing appropriate risk assessments to apply controls around AI agents.

“For organizations, this shifts AI agent governance from a technical oversight issue to a business risk management concern. Agent behavior must now be integrated into broader security, compliance, and operational resilience strategies rather than managed as an isolated automation challenge,” said the report.

AI Agent Decommissioning Lacks Governance

Once area where governance of AI agents is particularly lagging is around what happens when AI agents are decommissioned, with a distinct lack of controls around end-of-life governance.

Only one in five organizations have formal processes in place for decommissioning AI agents, meaning that AI agents may persist within the network, even after they have completed their intended purpose.

However, in many cases, they still hold onto credentials, permissions, or operational hooks, which could result in unintended data leaks or data breaches. The CSA report warned that as more AI agents become part of enterprise networks, the problem of forgotten agents retaining permissions could create cybersecurity risk.

Cloud Security Alliance Calls for Stronger AI Agent Security and Governance

The CSA has called for the issues around managing security and risk around AI agents to be addressed.

“AI agent security and governance encompass an interconnected system spanning visibility, lifecycle management, policy, and monitoring. While foundational controls are in place, gaps in consistency and end-of-life management remain,” said Hillary Baron, assistant vice president of research at the Cloud Security Alliance.

“As agents gain greater autonomy, governance must evolve into a more unified, operational model that can sustain control at scale,” she added.

To tackle this the CSA has issued the following advice to organizations:

  • Maintain visibility across AI agents — ensure agents operating across SaaS platforms, internal systems, and LLM environments are identified and within governance scope
  • Define and document agent purpose — establish intended function to set operational boundaries and align access with that scope
  • Apply lifecycle governance consistently — extend onboarding, ownership, review, and decommissioning processes across the full agent lifecycle
  • Evaluate actions based on risk and authorization — use contextual signals such as action risk and explicit human approval to guide decision-making
  • Align monitoring with agent activity — evolve from periodic oversight toward more continuous or event-driven detection models
  •  Incorporate agents into enterprise risk models — treat AI agents as part of broader security, compliance, and operational resilience frameworks



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleJanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025
Next Article CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software
Team-CWD
  • Website

Related Posts

News

Researchers Uncover ProxySmart Software Powering 90+ SIM Farms

April 22, 2026
News

CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software

April 22, 2026
News

JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025

April 22, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

It’s all fun and games until someone gets hacked

September 26, 2025

Don’t let “back to school” become “back to bullying”

September 11, 2025

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.