Cybersecurity

The AI Fix #70: AI behaves… until it knows you’re watching 

The AI Fix #70: AI behaves… until it knows you’re watching 

In episode 70 of The AI Fix, our hosts learn that AI makes people more dishonest, Waymo’s robo-cars save lives but get outsmarted by a bathroom mirror, a “rescue” bot slurps up victims head-first, and China shows off a fusion robot arm that can lift ten elephants (or 200,000 pigeons, if you’re scientific about it).

Meanwhile Graham reveals how AIs are tricked into solving CAPTCHAs with fake mouse wiggles, and Mark explains how OpenAI’s “deliberative alignment” works perfectly – until the AI realises it is being watched.

So, nothing to worry about there then…

All this and much more is discussed in the latest edition of “The AI Fix” podcast by Graham Cluley and Mark Stockley.

Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits 

Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits 

Cybersecurity researchers have disclosed three now-patched security vulnerabilities impacting Google’s Gemini artificial intelligence (AI) assistant that, if successfully exploited, could have exposed users to major privacy risks and data theft.
“They made Gemini vulnerable to search-injection attacks on its Search Personalization Model; log-to-prompt injection attacks against Gemini Cloud

Microsoft Expands Sentinel Into Agentic Security Platform With Unified Data Lake 

Microsoft Expands Sentinel Into Agentic Security Platform With Unified Data Lake 

Microsoft on Tuesday unveiled the expansion of its Sentinel Security Incidents and Event Management solution (SIEM) as a unified agentic platform with the general availability of the Sentinel data lake.
In addition, the tech giant said it’s also releasing a public preview of Sentinel Graph and Sentinel Model Context Protocol (MCP) server.
“With graph-based context, semantic access, and agentic

Stop Alert Chaos: Context Is the Key to Effective Incident Response 

Stop Alert Chaos: Context Is the Key to Effective Incident Response 

The Problem: Legacy SOCs and Endless Alert Noise
Every SOC leader knows the feeling: hundreds of alerts pouring in, dashboards lighting up like a slot machine, analysts scrambling to keep pace. The harder they try to scale people or buy new tools, the faster the chaos multiplies. The problem is not just volume; it is the model itself. Traditional SOCs start with rules, wait for alerts to fire,

Urgent: China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 

Urgent: China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 

A newly patched security flaw impacting Broadcom VMware Tools and VMware Aria Operations has been exploited in the wild as a zero-day since mid-October 2024 by a threat actor called UNC5174, according to NVISO Labs.
The vulnerability in question is CVE-2025-41244 (CVSS score: 7.8), a local privilege escalation bug affecting the following versions –

VMware Cloud Foundation 4.x and 5.x
VMware

New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events 

New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events 

Cybersecurity researchers have flagged a previously undocumented Android banking trojan called Datzbro that can conduct device takeover (DTO) attacks and perform fraudulent transactions by preying on the elderly.
Dutch mobile security company ThreatFabric said it discovered the campaign in August 2025 after users in Australia reported scammers managing Facebook groups promoting “active senior

Evolving Enterprise Defense to Secure the Modern AI Supply Chain 

Evolving Enterprise Defense to Secure the Modern AI Supply Chain 

The world of enterprise technology is undergoing a dramatic shift. Gen-AI adoption is accelerating at an unprecedented pace, and SaaS vendors are embedding powerful LLMs directly into their platforms. Organizations are embracing AI-powered applications across every function, from marketing and development to finance and HR. This transformation unlocks innovation and efficiency, but it also

U.K. Police Just Seized £5.5 Billion in Bitcoin — The World’s Largest Crypto Bust 

U.K. Police Just Seized £5.5 Billion in Bitcoin — The World’s Largest Crypto Bust 

A Chinese national has been convicted for her role in a fraudulent cryptocurrency scheme after law enforcement authorities in the U.K. confiscated £5.5 billion (about $7.39 billion) during a raid of her home in London.
The cryptocurrency seizure, amounting to 61,000 Bitcoin, is believed to be the single largest such effort in the world, the Metropolitan Police said.
Zhimin Qian (aka Yadi Zhang),

CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems 

CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting the Sudo command-line utility for Linux and Unix-like operating systems to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.
The vulnerability in question is CVE-2025-32463 (CVSS score: 9.3), which affects Sudo versions prior to

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X