“against ai agents that read web content, cataloging 22 techniques across live sites. hidden instructions can redirect agents to expose data, perform unauthorized transactions, and run server commands, and the researchers also observed a real - world bypass of an ai ad review syst…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1176.001Browser Extensions
61%
“cognizant, has disclosed a breach affecting more than 3. 4 million people. the exposed data includes insurance and medical information, with notifications issued this week after investigators determined the unauthorized access began in 2024. ai threats researchers outlined how pa…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1588.006Vulnerabilities
46%
“9th march – threat intelligence report for the latest discoveries in cyber research for the week of 9th march, please download our threat intelligence bulletin. top attacks and breaches akzonobel, a netherlands - based global paint manufacturer, has confirmed a cyberattack affect…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1176Software Extensions
38%
“cognizant, has disclosed a breach affecting more than 3. 4 million people. the exposed data includes insurance and medical information, with notifications issued this week after investigators determined the unauthorized access began in 2024. ai threats researchers outlined how pa…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
38%
“cognizant, has disclosed a breach affecting more than 3. 4 million people. the exposed data includes insurance and medical information, with notifications issued this week after investigators determined the unauthorized access began in 2024. ai threats researchers outlined how pa…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.002Malicious File
36%
“assisted migrations and affects versions 8 through 8. 18. 5 and 9 through 9. 0. 1, with patches and a workaround script available. qualcomm has addressed cve - 2026 - 21385, a memory corruption vulnerability affecting chipsets used in android phones, tablets, and iot devices. the…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.002Compromise Software Supply Chain
34%
“assisted migrations and affects versions 8 through 8. 18. 5 and 9 through 9. 0. 1, with patches and a workaround script available. qualcomm has addressed cve - 2026 - 21385, a memory corruption vulnerability affecting chipsets used in android phones, tablets, and iot devices. the…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
For the latest discoveries in cyber research for the week of 9th March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES AkzoNobel, a Netherlands-based global paint manufacturer, has confirmed a cyberattack affecting one of its United States sites. The company said the intrusion was contained, while the Anubis ransomware group claimed it stole […]