This machine is the only way to make nitro cold brew coffee at home – and it’s on sale
The Cumulus Coffee machine is uniquely designed to make cold brew, nitro, and cold espresso. Get one for 15% off now.
Latest news – Read More
The Cumulus Coffee machine is uniquely designed to make cold brew, nitro, and cold espresso. Get one for 15% off now.
Latest news – Read More
New version of Vidar infostealer spreads via fake CAPTCHAs, hides in JPEG and TXT files, uses fileless attacks and steals browser, crypto wallet data.
Hackread – Cybersecurity News, Data Breaches, AI and More – Read More
A race condition in PackageKit allows unprivileged users to escalate privileges when installing packages.
The post Easily Exploitable ‘Pack2TheRoot’ Linux Vulnerability Leads to Root Access appeared first on SecurityWeek.
SecurityWeek – Read More
The threat actor infected victims with the Snow malware family – Snowbelt, Snowglaze, and Snowbasin – for persistent access.
The post UNC6692 Uses Email Bombing, Social Engineering to Deploy ‘Snow’ Malware appeared first on SecurityWeek.
SecurityWeek – Read More
Nex Playground is a small cube that gets your kids up and moving with games they’ll love – and it’s on sale for the lowest price of the year.
Latest news – Read More
Cybersecurity researchers have disclosed details of a telecommunications fraud campaign that uses fake CAPTCHA verification tricks to dupe unsuspecting users into sending international text messages that incur charges on their mobile bills, generating illicit revenue for the threat actors who lease the phone numbers.
According to a new report published by Infoblox, the operation is believed to
The Hacker News – Read More
The vulnerability is tracked as CVE-2026-6770 and it has been patched with the release of Firefox 150 and Tor 15.0.10.
The post Firefox Vulnerability Allows Tor User Fingerprinting appeared first on SecurityWeek.
SecurityWeek – Read More

I was reviewing our authentication logs last week when something caught my eye. Between 2 AM and 4 AM, we logged over 47,000 API calls. Nothing unusual there—except these weren’t coming from users. They were all AI agents.
This got me thinking about a problem nobody’s really talking about yet: we’re about to drown in machine identities, and most of our security teams are still thinking like it’s 2015.
We spent decades building Identity and Access Management systems for humans. Then we evolved to Customer Identity systems that could handle millions of users. I spent years scaling CIAM platform to serve over a billion users, and I thought we’d seen everything.
We hadn’t.
AI agents don’t behave like humans. They don’t log in once a day. They don’t take coffee breaks. One agent can make thousands of requests per minute, accessing dozens of different systems, all with different credentials. And when something breaks? Good luck figuring out which agent, using which key, talking to which service caused the problem.
Last month, a developer on my team spun up an AI agent to automate some content research. Simple task, right? Within 24 hours, that agent had:
Now multiply that by every developer, every team, every use case. You see the problem.
Most companies are handling AI agent authentication the same way they handled service accounts in 2010: static API keys. Here’s why that’s a nightmare:
They live forever. That key you created for a proof-of-concept six months ago? Still valid. Still working. Still sitting in a GitHub repo somewhere.
They’re everywhere. Slack messages. Shared drives. Documentation. That one engineer’s personal notes. You’ll never find them all.
They scale exponentially. Each new AI agent needs keys for each service it touches. Five agents across ten services? That’s 50 credentials to manage, rotate, and secure.
And when you finally discover a compromised key? You have about 30 seconds to figure out which agent is using it before you break production.
Traditional IAM was built for humans. CIAM scaled it for millions of consumers. But AI agents are a different beast entirely:
The authentication patterns that worked for user identity completely break down at machine scale.
After dealing with this across multiple companies, here’s what I’ve learned:
Short-lived tokens. If your AI agent tokens live longer than an hour, you’re doing it wrong. Yes, it’s more work to implement. Yes, it’s worth it.
Centralized identity. Every agent gets registered. Every credential gets tracked. Every API call gets logged with full context about which agent made it. No exceptions.
Agent-specific roles. Stop giving agents admin access because it’s easier. If the agent only needs to read data, that’s all it gets.
Kill switches. You need the ability to instantly revoke an agent’s access without breaking everything else. Plan for compromise, because it will happen.
The uncomfortable truth is that most companies are building AI agents faster than they’re thinking about security. I see it constantly—teams spinning up agents with production access, using personal API keys, with zero thought about rotation, monitoring, or incident response.
And when I ask about their agent identity strategy? Blank stares.
I’m as excited about AI agents as anyone. We’re building them at GrackerAI and LogicBalls. But excitement doesn’t excuse bad security. The same principles that apply to human identity apply to machine identity—they just need to work at a completely different scale.
If you’re running AI agents in production (or about to be), here’s your starting checklist:
The AI agent explosion is happening whether we’re ready or not. The companies that take identity seriously now will save themselves a world of pain later.
The ones that don’t? Well, there’s always incident response consulting.
Deepak Gupta is co-founder & CEO at GrackerAI and previously co-founded LoginRadius, scaling it to serve over 1 billion users. He writes about AI, cybersecurity, and the intersection of both at guptadeepak.com.
Secjuice – Read More
Research suggests security specialists around the globe are unhappy, but there is hope.
Latest news – Read More
Microsoft Entra Agent ID flaw allowed privilege escalation and tenant takeover via Service Principal abuse, now fully patched by Microsoft.
Hackread – Cybersecurity News, Data Breaches, AI and More – Read More