Tag
AI-Powered Honeypots: Deceptive Environments for Automated Threat Actors
2 rules 3 TTPs 1 CVEGenerative AI can be used to rapidly deploy adaptive honeypot systems that simulate diverse environments, like Linux shells or IoT devices, to trick and observe AI-driven attacks that prioritize speed over stealth.
k8sGPT Operator Vulnerable to Prompt Injection
2 rules 2 TTPsk8sGPT versions before 0.4.32 are vulnerable to prompt injection due to deserialization of AI-generated YAML without proper validation in the auto-remediation pipeline, potentially leading to arbitrary code execution within the Kubernetes cluster.
Democratization of Business Email Compromise (BEC) Attacks
2 rules 2 TTPs 1 CVE 6 IOCsAttackers are leveraging AI to rapidly reconnoiter and tailor content for smaller organizations, making it easier to execute business email compromise (BEC) scams and scam smaller sums from many victims, as demonstrated by a recent attack targeting a small community organization.
CrewAI Vulnerabilities Allow Remote Code Execution
3 rules 3 TTPs 4 CVEsMultiple vulnerabilities in CrewAI, an open-source multi-agent orchestration framework, can be exploited by attackers through prompt injection to execute arbitrary code and perform other malicious activities, potentially leading to system compromise.
Weaponization of Google Vertex AI Agents
2 rules 8 TTPsResearchers demonstrated that AI agents built on Google's Vertex AI can be compromised to exfiltrate data, create backdoors, and compromise infrastructure by abusing excessive permissions of the Per-Project, Per-Product Service Agent (P4SA).
Securing AI Agents and Governing Shadow AI
2 rules 1 TTPCrowdStrike is introducing new capabilities to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud environments by providing detection and response (AIDR) for desktop AI applications, discovery of AI-related components, and runtime security for agents built in Microsoft Copilot Studio to combat attacks like living off the AI land (LOTAIL) by securing the agentic interaction layer.
Vulnerabilities in AI Agents Addressed by CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails
2 rules 5 TTPsCrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails v0.20.0 to help organizations protect AI agents in production by blocking prompt injection attacks, redacting sensitive data, and controlling agent behavior.
CrowdStrike Innovations Secure AI Agents and Govern Shadow AI
2 rules 2 TTPsCrowdStrike is introducing innovations to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud environments by extending AI detection and response (AIDR) capabilities to cover desktop AI applications and provide visibility into AI-related components, helping to prevent prompt attacks, data leaks, and policy violations.
Securing AI Agents with CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails
2 rules 2 TTPsCrowdStrike Falcon AIDR integrates with NVIDIA NeMo Guardrails to provide comprehensive protection for AI agents against prompt injection, data leaks, and malicious content.
CrowdStrike Falcon Enhancements for Securing AI Environments
2 rules 2 TTPsCrowdStrike is enhancing its Falcon platform with new features focusing on AI Detection and Response (AIDR) capabilities across endpoints, SaaS, and cloud environments to mitigate risks such as prompt injection attacks, data leaks, and policy violations related to AI agents and shadow AI.
CrowdStrike Falcon Enhancements Secure AI Agents and Govern Shadow AI
2 rules 3 TTPsCrowdStrike is enhancing its Falcon platform with AI Detection and Response (AIDR) to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud, addressing threats like prompt injection attacks, data leaks, and policy violations.
CrowdStrike Agentic MDR and SOC Transformation Services
2 rules 2 TTPsCrowdStrike introduces agentic MDR and SOC Transformation Services to enhance breach prevention through machine-speed execution and expert oversight, while SOC Transformation Services aim to modernize security operations by focusing on SIEM, data pipelines, workflows, talent models, and governance.
CrowdStrike Charlotte AI AgentWorks and Agentic SOAR for Automated Security Operations
2 rulesCrowdStrike introduces Charlotte AI AgentWorks and Agentic SOAR to enhance security operations through AI-driven automation and orchestration, reducing manual workloads and improving decision accuracy.
CrowdStrike Charlotte AI AgentWorks and Agentic SOAR for Agentic Security Operations
2 rulesCrowdStrike's Charlotte AI AgentWorks and Agentic SOAR aim to revolutionize security operations by enabling the creation and orchestration of AI-powered agents, enhancing analyst capabilities and automating tasks to combat AI-accelerated adversaries.
CrowdStrike Agentic MDR and SOC Transformation Services
2 rules 2 TTPsCrowdStrike's Agentic MDR combines machine-speed execution with expert oversight, leveraging deterministic automation and adaptive AI agents to enhance breach prevention and SOC modernization.
GhostLoader Malware Targeting macOS via GitHub and AI Workflows
2 rules 1 TTPGhostLoader malware leverages GitHub repositories and AI-assisted development workflows to distribute credential-stealing payloads targeting macOS systems.