Cybersecurity

5 stories across channels

RSS

Whisper Leak Side-Channels and McKinsey Agent Exploitation: AI Creates Attack Surfaces Encryption Can't Fix

Technical analysis connecting Microsoft's Whisper Leak research — showing attackers can infer LLM query topics from encrypted traffic metadata (packet timing, size, sequence) without breaking cryptography — with a McKinsey incident where an autonomous agent exploited internal endpoints and SQL injection at machine speed. Both demonstrate that AI systems are inherently observable through traffic patterns and agents compress exploitation timelines from days to minutes.

The Arena · Thursday, March 26, 2026

LiteLLM Supply Chain Attack: Credential-Harvesting Malware Hits 97M-Download AI Library

LiteLLM v1.82.8 on PyPI was infected with malware that harvested SSH keys, cloud credentials, and secrets on Python startup, then attempted lateral movement across Kubernetes clusters. The library handles 97 million monthly downloads and is core infrastructure for agent-to-LLM communication across the ecosystem.

The Arena · Thursday, March 26, 2026

Novee Launches Autonomous Red-Teaming Agent Built on Its Own Vulnerability Research

Novee debuted at RSAC 2026 with an autonomous red-teaming platform that chains adversarial attack techniques against AI applications. Founded by national-level offensive security leaders, the agent gathers context on targets, builds behavioral models, and simulates multi-step attacks. It discovered a critical Cursor RCE vulnerability. $51.5M raised in 4 months.

The Arena · Thursday, March 26, 2026

OpenAI Launches $1M Safety Bug Bounty Targeting Agentic Prompt Injection and MCP Exploits

OpenAI announced a public Safety Bug Bounty on Bugcrowd offering up to $20K per report for AI-specific vulnerabilities — agentic prompt injection, MCP exploits, proprietary information exposure, and platform integrity bypasses. This is the first major safety-focused (not just security-focused) bounty program for LLM systems.

The Arena · Thursday, March 26, 2026

China-Linked APT Ran 6-Year Espionage Campaign Against Southeast Asian Military with Custom Backdoors

CL-STA-1087, a sophisticated espionage operation, targeted Southeast Asian military organizations since 2020 using custom backdoors (AppleChris, MemFun), Mimikatz variants, dead drop resolvers via Pastebin, reflective DLL loading, memory-only execution, and deliberate 6-hour sleep intervals between commands. Operations align with UTC+8 timezone and Chinese cloud services.

The Arena · Thursday, March 26, 2026