Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

April 25, 2026

Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories

April 25, 2026

Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

April 25, 2026
Facebook X (Twitter) Instagram
Sunday, April 26
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns
News

AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns

Team-CWDBy Team-CWDApril 24, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The rush to adopt AI in enterprise environments is not only creating new security vulnerabilities, but is also reviving old security failures, a top Mandiant executive has warned.

Speaking to Infosecurity during Google Cloud Next 26, Jurgen Kutscher, VP of Mandiant Consulting, part of Google Cloud, said that AI deployment in enterprises is often accompanied by a neglect of basic security controls.

“A lot of the old problems are new again,” Kutscher said. “We’ve seen enterprises really worried about new AI threats like large language model poisoning while forgetting the most basic security controls.”

Mandiant Red Team Reveals Cybersecurity Failings 

Kutscher said Mandiant’s red team has uncovered real security failures caused by this mismanagement during simulated real‑world attacks, in which testers adopt the tactics of genuine adversaries to probe organizations’ defenses.

During red-team engagements, he has seen AI-enabled environments where an attacker could change data classifications, allowing them to bypass protections like data loss protection (DLP) solutions.

Furthermore, Kutscher was “surprised” to find even simple mistakes such as unencrypted communication streams.

“For instance, we observed an unencrypted communication stream between the AI and the browser when working with a financial company,” he said, underscoring how basic hygiene was being overlooked.

In multiple engagements, Mandiant red teamers were able to social-engineer initial access and then rely on the AI to perform follow-on actions, including exfiltration and policy changes.

“Once we’re inside, we’ve had the AI do the rest for us, including data theft and everything. And I’m talking about authorized AI deployments, not event shadow AI cases, where employees have deployed AI workflows without the company’s oversight,” Kutscher said.

Organizations should build AI security governance processes as soon as possible.  

He emphasized that creating policies and governance is easier than cleaning up uncontrolled AI usage after the fact. He recommended revisiting secure architecture and performing red-team validation to ensure critical assets are truly segmented.

While recognizing AI’s power for defense, Kutscher urged CISOs not to assume AI adoption absolves them of basic cybersecurity responsibilities.

“It’s possible that these mistakes partly come from the fact that CISOs aren’t always involved in the deployment of AI workflows, among many other reasons, I don’t want to speculate, but the lack of basic security controls around AI workflow deployments is there and it’s a significant risk,” he concluded.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous Articlen8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails
Next Article UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign
Team-CWD
  • Website

Related Posts

News

Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

April 25, 2026
News

Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories

April 25, 2026
News

Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

April 25, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

What it takes to fool facial recognition

March 14, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.