CyberSecurity SEE

US Lawmakers Raise Concerns About AI Bug Hunters

US Lawmakers Raise Concerns About AI Bug Hunters

Cybersecurity Incidents and Breaches Roundup: Key Developments

In a weekly report from Information Security Media Group (ISMG), a plethora of cybersecurity incidents and breaches have emerged, highlighting the pressing need for robust cybersecurity measures. Notably, U.S. lawmakers are advocating for a proactive federal approach to manage an increasing wave of vulnerability disclosures attributed to artificial intelligence advancements. Concurrently, a researcher unveiled exploits that can bypass Microsoft’s BitLocker security, prompting concern among users of Windows 11 and Server 2025 systems. Additionally, notable breaches have been reported by Škoda, Nvidia’s GeForce NOW partner, and the telehealth firm OpenLoop.

U.S. Lawmakers Call for Action on AI Vulnerabilities

A bipartisan group of nearly 35 members from the U.S. House of Representatives has urged the White House to strategize a response to an anticipated surge in security vulnerabilities identified by AI technologies. This coalition, spearheaded by Rep. Bob Latta (R-Ohio), outlined the necessity for collaboration between federal agencies and private sector executives to develop methodologies for addressing security flaws that could arise in what is being termed the post-Mythos era of cybersecurity. The renewed interest in AI’s role in vulnerability discovery has been sparked by groundbreaking models such as those created by Anthropic, which have exhibited remarkable capabilities in detecting system weaknesses.

In their letter to National Cyber Director Sean Cairncross, the lawmakers advocate for government initiatives encouraging AI developers to routinely provide early access to critical project maintainers. The recommendation includes providing supplemental support to critical infrastructure operators lacking sufficient cybersecurity resources. The letter emphasizes creating structured protocols that decide when to limit the disclosure of vulnerabilities, thereby safeguarding systems from unchecked exploitation.

This call comes in the wake of revelations from numerous tech companies that have successfully integrated AI to discover previously undocumented vulnerabilities, raising alarm about the potential ramifications if these weaknesses are exploited.

New Exploits Targeting Windows Systems

In an alarming development, a researcher using pseudonyms such as "Nightmare-Eclipse" and "Chaotic Eclipse" disclosed two separate but related exploits, dubbed "YellowKey" and "GreenPlasma." These tools exploit vulnerabilities within the Windows operating systems, particularly impacting versions 11 and 2022/2025 of Windows Server. By leveraging physical access to a device, attackers can bypass BitLocker, Microsoft’s disk encryption program, consequently gaining unauthorized access to encrypted information.

The YellowKey exploit presents a dire threat as it enables the creation of a command shell with access to BitLocker-protected areas without the need for external storage devices. This was achieved by manipulating NTFS transactions along with the Windows Recovery Environment, raising concerns about potential backdoors within the software. The GreenPlasma exploit, meanwhile, takes advantage of the fundamental input service of Windows to achieve similar privilege escalation, effectively allowing unauthorized actions with system-level permissions.

Škoda and Other Breaches

In a breach affecting Şkoda, vulnerabilities within the standard software of the auto manufacturer’s online shop led to unauthorized access to sensitive customer data. Although the company maintained that payment card data remained secured, the breach revealed personal information, raising concerns over customer privacy.

Nvidia’s GeForce NOW service partner also experienced a data breach, with hackers reportedly offering millions of user records for sale in online forums. The disclosed information included names, email addresses, and other personally identifiable data, emphasizing the evolving landscape of cybercrime.

Furthermore, telehealth provider OpenLoop revised its total patient count affected by a hacking incident in January to 716,000 individuals. The breach, initially reported with a lower figure, led to unauthorized access to various personal details of patients, demonstrating a growing trend in the exploitation of healthcare systems.

Microsoft Patches Vulnerabilities

In response to ongoing cybersecurity challenges, Microsoft released a significant patch correcting approximately 120 vulnerabilities across various platforms and applications in May 2026. Notably, no zero-day vulnerabilities were highlighted in this update, a noteworthy occurrence. Among the patched vulnerabilities was a critical flaw identified as CVE-2026-41089, which could allow attackers to seize SYSTEM privileges on domain controllers without user interaction.

Concluding Thoughts

Cybersecurity incidents are increasingly becoming a focal point in both governmental and corporate strategies to safeguard sensitive data. The interdisciplinary cooperation between legislative bodies, technology firms, and cybersecurity entities appears essential in mitigating risks associated with emerging technologies like artificial intelligence. The ongoing echoing of concerns and reactions to systematic breaches in various sectors underlines the critical need for enhanced security measures and proactive incident response protocols, particularly as enterprises venture deeper into a digitized landscape fraught with evolving threats. As reported, organizations must remain vigilant in their efforts to secure data against not just existing threats but also the unforeseen vulnerabilities that are likely to arise.

Source link

Exit mobile version