Daily Cyber & AI Briefing with Michael Housch. This episode was published automatically and includes the assembled audio plus full transcript. TranscriptToday’s cyber and AI risk landscape is shaped by two powerful and converging forces: the relentless exploitation of critical software vulnerabilities, and the rapid, sometimes unchecked, adoption of artificial intelligence across every sector. The risks are immediate and evolving, and the stakes are higher than ever. In this briefing, we’ll break down the most pressing threats, explore the latest regulatory and industry responses, and highlight what risk leaders need to do now to stay ahead. Let’s start with the cyber front, where attackers continue to exploit zero-day vulnerabilities in widely used platforms. The most urgent case right now is a critical authentication bypass vulnerability in cPanel & WHM. For context, cPanel is one of the most popular web hosting control panels, powering millions of websites and applications globally. This particular vulnerability allowed attackers to gain unauthorized access to administrative functions—essentially giving them the keys to the kingdom. What’s especially concerning is that this flaw was exploited as a zero-day for several months before it was publicly disclosed and patched. Proof-of-concept code is now available, making it even easier for opportunistic attackers to target unpatched systems. Active exploitation is ongoing. For organizations relying on cPanel, the implications are severe: data breaches, service disruptions, and the potential for widespread compromise. The immediate takeaway is clear—patching cannot wait. Security leaders must move quickly to apply available updates and, just as importantly, review access logs for any signs of compromise. Delayed response at this stage could mean the difference between a contained incident and a full-blown breach. A similar story is unfolding with ASUSTOR ADM, the operating system behind ASUSTOR’s network-attached storage devices. A proof-of-concept exploit for a critical remote code execution vulnerability has been released, allowing attackers to gain root access. For organizations using these NAS devices—often as central repositories for sensitive data—this is a direct path to full system compromise and data exfiltration. The risk is especially high for devices exposed to the internet. Here, too, the guidance is straightforward but urgent: patch immediately, and if possible, segment these devices from the broader network to limit exposure. For any internet-facing NAS, consider additional monitoring and, if feasible, restrict access to trusted IPs only. These incidents reinforce a hard truth: zero-days are not rare events, and attackers move quickly. Continuous vulnerability management and rapid incident response are not optional—they’re foundational to resilience. Shifting to the AI landscape, we’re seeing a dramatic acceleration in adoption, but the governance and compliance frameworks needed to manage AI risk are lagging behind. Senior industry leaders are sounding the alarm about a critical shortfall in AI compliance. Many organizations, especially outside of the tech sector, simply don’t have robust frameworks in place to ensure responsible AI deployment. The absence of clear ownership and governance structures creates a perfect storm for regulatory breaches, ethical lapses, and reputational harm. This isn’t just a theoretical concern. Australia’s financial regulator recently issued a stark warning to banks about the risks posed by ungoverned AI systems. The message: without robust oversight and governance, AI-driven decision-making can lead to systemic failures and regulatory non-compliance. The financial sector is often the canary in the coal mine for emerging risks, and this warning should resonate across industries. If you’re a risk leader in financial services—or any sector rapidly integrating AI—the time to