Resurgence of basic cybersecurity failures amid accelerated enterprise AI adoption
Summary
Hide ▲
Show ▼
Enterprises rapidly deploying AI systems are neglecting fundamental security controls, reviving previously mitigated risks while introducing new attack surfaces, according to Mandiant’s red-team findings. Security teams have observed adversaries leveraging authorized AI deployments to alter data classifications, bypass data loss prevention systems, and exfiltrate data, with initial access often gained through social engineering. Basic lapses—such as unencrypted AI-to-browser communication in financial environments—underscore systemic failures in secure AI integration.
Timeline
-
24.04.2026 15:10 1 articles · 2h ago
Mandiant red-team findings reveal systemic security lapses in enterprise AI deployments
Red-team engagements conducted by Mandiant identified multiple instances where authorized AI systems were leveraged to bypass security controls, exfiltrate data, and modify classifications, with initial footholds established via social engineering. Observed failures included unencrypted AI-to-browser communications and inadequate governance, particularly in financial sector deployments.
Show sources
- AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns — www.infosecurity-magazine.com — 24.04.2026 15:10
Information Snippets
-
Mandiant’s red-team engagements revealed that attackers could manipulate data classifications within AI-enabled environments to bypass data loss prevention (DLP) solutions.
First reported: 24.04.2026 15:101 source, 1 articleShow sources
- AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns — www.infosecurity-magazine.com — 24.04.2026 15:10
-
Unencrypted communication streams between AI interfaces and browsers were observed in a financial sector deployment, demonstrating lapses in basic encryption hygiene.
First reported: 24.04.2026 15:101 source, 1 articleShow sources
- AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns — www.infosecurity-magazine.com — 24.04.2026 15:10
-
Red-team testers achieved initial access via social engineering and subsequently used authorized AI deployments to execute follow-on actions, including data exfiltration and policy modifications.
First reported: 24.04.2026 15:101 source, 1 articleShow sources
- AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns — www.infosecurity-magazine.com — 24.04.2026 15:10
-
AI deployment decisions are reportedly occurring without mandatory involvement from CISOs in many organizations, contributing to ungoverned and insecure AI workflows.
First reported: 24.04.2026 15:101 source, 1 articleShow sources
- AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns — www.infosecurity-magazine.com — 24.04.2026 15:10