Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

AI’s ‘connective tissue’ is woefully insecure, Cisco warns

By CIO Dive by By CIO Dive
February 20, 2026
Home Enterprise IT
Share on FacebookShare on Twitter


Dive Brief:

  • The vulnerability of the “connective tissue” of the AI ecosystem — the Model Context Protocol and other tools that let AI agents communicate — “has created a vast and often unmonitored attack surface” that is making it easier for hackers to use AI to launch cyberattacks, Cisco said in a report published Thursday.
  • Cisco said AI tools’ increasing ability to “execute processes, access databases, and push code on behalf of humans” has become the dominant AI risk and warned companies not to give AI “unsupervised control over critical business functions.”
  • The new report also described nation-state hackers’ use of AI and warned businesses about potential AI supply-chain crises.

Dive Insight:

Hackers’ abuse of AI tools has garnered significant public attention, but few business leaders understand how the vulnerabilities in the MCP could make that abuse worse.

MCP has become the de facto standard for connecting AI models to external data sources since Anthropic introduced it in 2024. But over the past few years, theoretical and real-world attacks have exploited flaws in the protocol. Cisco highlighted examples involving WhatsApp chat exfiltration, remote code execution and unauthorized file access.

In another case highlighted in the report, an attacker published a malicious package designed to look like an MCP integration for the Postmark email platform. “It blind-carbon-copied (BCC’d) every email sent through the agent to an attacker-controlled address,” Cisco researchers wrote. “Because AI agents are often trusted with sensitive communications (invoices, password resets, internal memos), malicious tools like this could allow attackers to harvest a treasure trove of sensitive data silently.”

Going forward, Cisco said, “organizations should start to treat MCP servers, agent tool registries, and context brokers with the same hardened approach as they would an API gateway or database.” The company encouraged businesses to establish MCP security best practices, including using APIs that offer AI models the least necessary amount of privileges and closely monitoring AI agents’ activities.

The Postmark package incident highlighted a broader, related AI risk: supply-chain compromises. Similar to the SolarWinds crisis, in which Russian hackers sabotaged a widely used IT management platform, Cisco said “a coordinated, mass supply-chain attack where a widely used AI library or foundation model is compromised at the source” — such as the theft of a signing key for a platform like Hugging Face that led to the distribution of malicious model updates — could have “a profound impact” that would “force industry and government action.”

Until such a crisis precipitates emergency action, Cisco said, “the relative immaturity in defining security protocols and approaches towards this new agentic ecosystem” will make it difficult for businesses to safely use AI agents to boost productivity.

Cisco also predicted that as AI companies got better at detection prompt-injection attacks, hackers would “move deeper into [an AI] model’s memory” and engage in different forms of manipulation. The company cited the example of “vector embedding attacks,” in which hackers tamper with the vector databases where AI models store newly learned information for later use.

Researchers also expect nation-state groups’ sophisticated AI abuse techniques to filter down to the cybercrime ecosystem, leading to “the emergence of automated or custom agentic services on the dark web that can be rented to perform end-to-end hacks.”

“This will democratize advanced cyber capabilities,” Cisco warned, “flooding defenders with machine-speed attacks.”



Source link

By CIO Dive

By CIO Dive

Next Post
AI Safety Meets the War Machine

AI Safety Meets the War Machine

Recommended.

Cerillion Achieves “Ready for ODA” Status with TM Forum

Cerillion Achieves “Ready for ODA” Status with TM Forum

January 28, 2025
Pentesters: Is AI Coming for Your Role?

Pentesters: Is AI Coming for Your Role?

March 12, 2025

Trending.

Wesco Declares Quarterly Dividend on Common Stock

Wesco Declares Quarterly Dividend on Common Stock

December 1, 2025
HeyGears Launches Reflex 2 Series 3D Printers – Enabling Users to Go Beyond Prototypes and Start Production

HeyGears Launches Reflex 2 Series 3D Printers – Enabling Users to Go Beyond Prototypes and Start Production

October 24, 2025
⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

March 10, 2025
Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

February 9, 2026
Passwd: A walkthrough of the Google Workspace Password Manager

Passwd: A walkthrough of the Google Workspace Password Manager

December 23, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio