[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fGICtp0H7_o_ZkxGlYpMI2UAhMddwQtssAZxB9yE4jG0":3},{"locale":4,"topic":5,"relatedTrends":120},"fr",{"topic":6,"slug":7,"canonicalSlug":7,"topicAliases":8,"nicheKey":11,"nicheName":12,"nicheNameEn":12,"nicheIcon":13,"country":14,"countries":15,"agentKey":16,"score":17,"type":18,"isFresh":19,"detectedAt":20,"sources":21,"evidence":117},"Agentic AI expanding enterprise attack surface and risks","agentic-ai-increasing-enterprise-attack-surface-and-security-risks",[9,10],"Agentic AI expanding enterprise attack surface via broad permissions","Agentic AI increasing enterprise attack surface and security risks","ai-engineering","AI Engineering & LLM Ops","⚙️","US",[14],"ai-engineering-US",96,"spiking",true,"2026-05-16T01:03:34.331Z",[22,28,34,39,44,49,54,59,64,69,74,79,84,88,92,97,102,107,112],{"title":23,"url":24,"domain":25,"snippet":26,"content":27},"Why Agentic AI Is Security's Next Blind Spot","https:\u002F\u002Fthehackernews.com\u002F2026\u002F05\u002Fwhy-agentic-ai-is-securitys-next-blind.html","thehackernews.com","Agentic AI deployments with broad permissions and unreviewed agents increase lateral movement risks and broaden enterprise security exposure.",")\n\nContact\u002FTip Us\n\nFollow Us On Social Media\n\n](https:\u002F\u002Fthehackernews.uk\u002Fwiz-ai-state-d)\n\n__ The Hacker News __ May 12, 2026 Artificial Intelligence \u002F Threat Detection\n\n](https:\u002F\u002Fblogger.googleusercontent.com\u002Fimg\u002Fb\u002FR29vZ2xl\u002FAVvXsEhzo1TUnQJpFnJbrO50dvjG14LDr2L6gKHsIIr5P73rSCgksrt2B9eVmRGKxPVvJ1qVMF63ka4So6vj5ln9T1nBIt2MV2DcH_dnYyQp1RREL4nbtnPghY7q5SAwZCwv0bN1ZV58DyTZSLw3UN00nP7uUcX_3ZqFQmAjufAvNRFshC5AJCuMdHb2n9kzC3w\u002Fs1700-e365\u002Fai-agents.jpg)\n\nAgentic AI is already running in production environments across many organizations today. It is executing tasks, consuming data, and taking actions — \n\n[Content truncated...]",{"title":29,"url":30,"domain":31,"snippet":32,"content":33},"Top AI Security Tools for the Cloud: Secure AI Workloads","https:\u002F\u002Fwww.wiz.io\u002Facademy\u002Fai-security\u002Fai-security-tools","wiz.io","Discover the 8 best AI security tools for protecting ML workloads in 2026. Compare features, use cases, and how to secure AI across the full lifecycle.",null,{"title":35,"url":36,"domain":37,"snippet":38,"content":33},"The AEGIS Framework: Enterprise Guardrails For Securing Agentic AI","https:\u002F\u002Fwww.forrester.com\u002Ftechnology\u002Faegis-framework\u002F","forrester.com","The AEGIS framework helps security leaders govern agentic AI with enterprise guardrails across IAM, data, applications, threat operations, and Zero Trust.",{"title":40,"url":41,"domain":42,"snippet":43,"content":33},"AI Interoperability in Healthcare Introduces New Cyber Risks","https:\u002F\u002Fwww.forvismazars.us\u002Fforsights\u002F2026\u002F05\u002Fai-interoperability-in-healthcare-introduces-new-cyber-risks","forvismazars.us","AI interoperability in healthcare expands the cyberattack surface. Learn how AI in healthcare systems can create cascading risks and what to consider now.",{"title":45,"url":46,"domain":47,"snippet":48,"content":33},"Dell and Intel event addresses AI factory security risks","https:\u002F\u002Fsiliconangle.com\u002F2026\u002F05\u002F13\u002Fdell-intel-ai-factory-security-securingtheaifactory\u002F","siliconangle.com","Agentic artificial intelligence is transforming the enterprise world — and creating dangerous security gaps at every turn. The rise of the AI factory,...",{"title":50,"url":51,"domain":52,"snippet":53,"content":33},"AI Agents Are Creating a New Cybersecurity Blind Spot","https:\u002F\u002Fsecurityboulevard.com\u002F2026\u002F05\u002Fai-agents-are-creating-a-new-cybersecurity-blind-spot\u002F","securityboulevard.com","The cybersecurity industry has spent years focusing on visibility. Dashboards expanded. Detection tooling improved. Telemetry volumes exploded.",{"title":55,"url":56,"domain":57,"snippet":58,"content":33},"Webinar | The New Attack Surface: Defending the Autonomous AI Ecosystem","https:\u002F\u002Fwww.govinfosecurity.com\u002Fwebinars\u002Fwebinar-new-attack-surface-defending-autonomous-ai-ecosystem-w-7066","govinfosecurity.com","AI systems are introducing new layers of risk across the enterprise. From data ingestion to model development and autonomous execution, each stage of the AI...",{"title":60,"url":61,"domain":62,"snippet":63,"content":33},"Shadow AI surge exposes governance and security gaps","https:\u002F\u002Fwww.msn.com\u002Fen-us\u002Fnews\u002Finsight\u002Fshadow-ai-surge-exposes-governance-and-security-gaps\u002Fgm-GMCD5590FB?gemSnapshotKey=GMCD5590FB-snapshot-1","msn.com","Governance lag: AI tools are widely deployed, but most organizations lack policies, oversight, and integration to ensure safe and effective use.",{"title":65,"url":66,"domain":67,"snippet":68,"content":33},"News brief: Security worries and warnings as AI use expands","https:\u002F\u002Fwww.techtarget.com\u002Fsearchsecurity\u002Fnews\u002F366642881\u002FNews-brief-Worries-and-warnings-as-AI-use-expands","techtarget.com","\"We live in a world that could become fraught with day-to-day hazards from the misuse of AI and we need to take ownership of the problems -- because the...",{"title":70,"url":71,"domain":72,"snippet":73,"content":33},"5 steps for frontier AI readiness","https:\u002F\u002Fwww.cio.com\u002Farticle\u002F4168909\u002F5-steps-for-frontier-ai-readiness.html","cio.com","Frontier AI models can lower the skill barrier for attackers and compress the time between exposure and exploitation faster than defenders can patch.",{"title":75,"url":76,"domain":77,"snippet":78,"content":33},"Push Security Launches AI-Native Agentic Threat Hunting for the Browser, Redefining Detection & Response in the Secure Enterprise Browser Market","https:\u002F\u002Fwww.businesswire.com\u002Fnews\u002Fhome\u002F20260512397560\u002Fen\u002FPush-Security-Launches-AI-Native-Agentic-Threat-Hunting-for-the-Browser-Redefining-Detection-Response-in-the-Secure-Enterprise-Browser-Market","businesswire.com","New capabilities combine deep threat research, rich browser telemetry, and AI agents to deliver the most powerful detection capabilities in the industry.",{"title":80,"url":81,"domain":82,"snippet":83,"content":33},"AI Agents Are Creating a New Identity Security Problem","https:\u002F\u002Fwww.technology.org\u002F2026\u002F05\u002F07\u002Fai-agents-are-creating-a-new-identity-security-problem\u002F","technology.org","The rapid rise of AI agents is forcing enterprises to confront a problem that traditional cybersecurity infrastructure was never designed to handle: how do...",{"title":85,"url":86,"domain":52,"snippet":87,"content":33},"AI agent governance: A guide for security teams","https:\u002F\u002Fsecurityboulevard.com\u002F2026\u002F05\u002Fai-agent-governance-a-guide-for-security-teams\u002F","AI agents are spreading through enterprise environments without IT approval. Here's how security teams build an agent inventory and apply the right...",{"title":89,"url":90,"domain":47,"snippet":91,"content":33},"The dual-threat landscape and evolution of digital workers","https:\u002F\u002Fsiliconangle.com\u002F2026\u002F05\u002F14\u002Fdual-threat-landscape-evolution-digital-workers-kb4con\u002F","Enterprises are discovering that the same AI agents boosting productivity can just as easily become liabilities in the hands of bad actors — a dynamic that...",{"title":93,"url":94,"domain":95,"snippet":96,"content":33},"Crogl Offers Free AI SOC Tool as MSSPs Face Rising Alert Pressure","https:\u002F\u002Fwww.msspalert.com\u002Fnews\u002Fcrogl-offers-mssps-a-free-version-of-its-agentic-ai-powered-security-platform","msspalert.com","AI agents are now being increasingly called into 'action' to enable defenders to move at the same machine speed as the AI-wielding threat actors.",{"title":98,"url":99,"domain":100,"snippet":101,"content":33},"Cyber Risk Tops Global Executive Concerns as AI-Powered Attacks Outpace Defenses","https:\u002F\u002Friskandinsurance.com\u002Fcyber-risk-tops-global-executive-concerns-as-ai-powered-attacks-outpace-defenses\u002F","riskandinsurance.com","Cyber risk has become the leading concern for businesses worldwide, with 31% of executives selecting data breaches, criminal threats and widespread outages...",{"title":103,"url":104,"domain":105,"snippet":106,"content":33},"Stop Chasing Threats: Top Insights from 2025 SANS ASM Survey","https:\u002F\u002Fblog.qualys.com\u002Fproduct-tech\u002F2026\u002F05\u002F14\u002Fsans-attack-surface-management-survey-2025-insights","blog.qualys.com","The 2025 SANS ASM Survey highlights a clear shift in cybersecurity operations. Organizations are moving beyond fragmented, alert-driven security approaches...",{"title":108,"url":109,"domain":110,"snippet":111,"content":33},"Why OT Security Is Paramount for the Future Health of Enterprises","https:\u002F\u002Fbiztechmagazine.com\u002Farticle\u002F2026\u002F05\u002Fwhy-ot-security-paramount-future-health-enterprises?amp","biztechmagazine.com","Securing the operational technology vital to many organizations requires a shift from reactive patching to proactive management.",{"title":113,"url":114,"domain":115,"snippet":116,"content":33},"Token Security Named to Rising in Cyber 2026 List of Top Cybersecurity Startups","https:\u002F\u002Fmarkets.businessinsider.com\u002Fnews\u002Fstocks\u002Ftoken-security-named-to-rising-in-cyber-2026-list-of-top-cybersecurity-startups-1036143063","markets.businessinsider.com","NEW YORK, May 12, 2026 (GLOBE NEWSWIRE) -- Token Security, the leader in identity-first AI agent security, today announced its inclusion in Risi...",{"mentionsLast7Days":118,"mentionsLast30Days":118,"firstSeen":20,"lastSeen":20,"relatedEntities":119},1,[24,90,94,99,36,104,51,76,109,114],[121,125,129,132,137,141],{"topic":122,"slug":123,"score":124,"type":18,"country":14,"nicheIcon":13},"Limitations of AI tools in real-world security operations centers","limitations-of-ai-tools-in-real-world-security-operations-centers",100,{"topic":126,"slug":127,"score":128,"type":18,"country":14,"nicheIcon":13},"Cursor TypeScript SDK to deploy AI coding agents via CI\u002FCD","cursor-typescript-sdk-to-deploy-ai-coding-agents-via-ci-cd",99,{"topic":130,"slug":131,"score":128,"type":18,"country":14,"nicheIcon":13},"Amazon's policy requiring engineers to review all AI-generated output","amazon-s-policy-requiring-engineers-to-review-all-ai-generated-output",{"topic":133,"slug":134,"score":135,"type":136,"country":14,"nicheIcon":13},"Operational ceiling: infrastructure bottlenecks hindering AI production reliability","operational-ceiling-infrastructure-bottlenecks-hindering-ai-production-reliability",81,"emerging",{"topic":138,"slug":139,"score":140,"type":18,"country":14,"nicheIcon":13},"Logic's spec-driven platform for fully managed AI agents","logic-s-spec-driven-platform-for-fully-managed-ai-agents",78,{"topic":142,"slug":143,"score":140,"type":18,"country":14,"nicheIcon":13},"Microsoft MDASH multi-model agentic cyber defense system","microsoft-mdash-multi-model-agentic-cyber-defense-system"]