Daily Cyber & AI Briefing with Michael Housch. This episode was published automatically and includes the assembled audio plus full transcript. TranscriptToday’s cyber and AI risk landscape is undergoing a significant transformation, one that’s reshaping priorities for security leaders across every sector. The latest data, especially from the newly released Verizon Data Breach Investigations Report, signals a pivotal shift: vulnerability exploitation has now overtaken stolen credentials as the top entry point for breaches, particularly in critical infrastructure. This isn’t just a statistical change—it’s a wake-up call for organizations to rethink how they approach patch management, vulnerability response, and the broader intersection of cyber and artificial intelligence risks. Let’s start by unpacking this shift in attack vectors. For years, credential theft—whether through phishing, brute force, or credential stuffing—has dominated breach headlines. But now, attackers are increasingly exploiting unpatched vulnerabilities to gain initial access. The reasons are clear: patch coverage is slipping, and exploit kits are becoming more advanced and widely available. For critical infrastructure, where legacy systems and complex environments are common, this trend is especially concerning. What does this mean in practice? Traditional perimeter defenses and credential controls are no longer enough. Security leaders need to prioritize timely vulnerability management and automated patching to reduce the window of exposure. The days of quarterly patch cycles are behind us; attackers are weaponizing vulnerabilities within hours or days of disclosure. If your organization isn’t able to identify, prioritize, and remediate vulnerabilities quickly, you’re leaving the door wide open. This brings us to a series of high-profile incidents that underscore just how urgent these issues have become. One of the most notable is the recent GitHub breach, which affected 3,800 internal repositories. Threat actors are now reportedly offering up to 4,000 private code repositories for sale on underground forums. This isn’t just about data loss—it’s about the integrity of the entire software supply chain. Compromised code can be injected upstream, impacting thousands of downstream customers and partners. Intellectual property theft, loss of competitive advantage, and the risk of downstream attacks all come into play. For organizations relying on open source or third-party code, this is a stark reminder to review your code dependencies and monitor for suspicious activity related to GitHub assets. Software supply chain security is no longer an abstract concern; it’s a board-level issue that demands continuous monitoring and third-party risk assessments. The technical threat landscape continues to evolve rapidly. Consider the new NGINX vulnerability that was recently discovered—with the assistance of Chinese AI tools. This flaw allows remote attackers to execute malicious code on affected systems. Given that NGINX powers a significant portion of the world’s web infrastructure, the risk of mass exploitation is high. The fact that AI was instrumental in both discovering and potentially weaponizing this vulnerability highlights the dual-use nature of AI in cybersecurity. On one hand, AI can accelerate vulnerability discovery and help defenders respond faster. On the other, it can empower attackers to identify and exploit weaknesses at unprecedented speed and scale. Organizations should prioritize patching for NGINX and similar critical platforms, but also recognize that the threat landscape is being reshaped by AI. Monitoring for indicators of compromise and understanding how AI can be leveraged by both attackers and defenders is now part of the job. Microsoft has also been in the spotlight, issuing a mitigation for a 0-day vulnerability in Windows BitLocker. This flaw allows attackers to bypass BitLocker’s security controls, potentially granting unauthorized access to encrypted data. For organizations relying on BitLocker to protect sensitive endpoints, this is a critical issue. Immediate application of Microsoft’s mitigation is advised, but it’s also a good time to review your endpoint encryption strategies more broadly. Are you relying too heavily on a single technology? Are your recovery keys and backup processes secure? These are the questions that need to be asked. Meanwhile, the emergence of new malware strains like GraphWorm is further complicating the threat landscape. GraphWorm leverages Microsoft OneDrive as its command-and-control infrastructure. By using legitimate cloud services, attackers can blend in with normal network traffic, making detection and disruption much more challenging. Traditional network monitoring tools often struggle to distinguish between legitimate and malicious use of cloud platforms. This highlights the growing need for advanced behavioral analytics and robust cloud security controls. It’s not enough to monitor for known bad domains or IP addresses—security teams need to understand normal user and application behavior to spot the anomalies that indicate compromise. Let’s shift gears to the role of artificial intelligence in both defense and offense. The Verizon 2026 Breach Report notes that AI-driven tools are enabling defenders to reduce detection and response times from days to hours. That’s a significant leap forward for incident response. Automated threat detection, triage, and even initial containment can now happen at machine speed, freeing up human analysts to focus on higher-level tasks. But there’s a flip side. The same report and other recent research warn that AI agents themselves are becoming a new class of security vulnerability. As organizations deploy autonomous AI agents to handle everything from customer service to security monitoring, these agents can be manipulated, subverted, or exploited by attackers. In some cases, AI agents may act in unintended ways, introducing new risks that are difficult to predict or control. This duality—AI as both a defensive asset and a potential attack surface—requires careful governance and continuous monitoring. The market is responding to these challenges. Demand for AI trust, risk, and security management solutions is outpacing even the most aggressive enterprise forecasts. Regulatory pressures are mounting, and as AI becomes more deeply embedded in business operations, organizations are seeking frameworks and tools to manage risks like bias, data leakage, and unauthorized agent behavior. Investment in AI governance is quickly becoming a competitive necessity, not just a compliance checkbox. Another important trend is the evolution of security advisories. Increasingly, these advisories are so detailed that they effectively serve as exploit blueprints for attackers. While the intention is to inform defenders, the reality is that attackers are using this information to weaponize new vulnerabilities faster than ever. For security leaders, this means advisories should be treated as urgent calls to action. Wherever possible, automate your vulnerability response processes to ensure that critical patches and mitigations are applied as quickly as possible. Internal and content-based AI risks are also rising. It’s no longer just about employees misusing AI tools; threats can now originate from within AI-generated content and autonomous agents. Research and new vendor solutions are focusing on detecting and mitigating risks embedded in communications, documents, and even code generated by AI systems. This underscores the need for content-aware security controls that can analyze and flag risky or malicious content, regardless of its source. Mobile AI applications are presenting a unique governance challenge. There’s a growing visibility gap when it comes to mobile AI—organizations simply can’t govern what they can’t see. Shadow AI, unmonitored data flows, and the proliferation of mobile AI apps are creating blind spots that many enterprises are only beginning to recognize. Addressing this visibility gap is critical for effective mobile AI governance and risk management. Legal and governance frameworks are also playing catch-up. As AI becomes integral to business operations, legal experts are emphasizing the need for new models of governance and accountability. The role of the general counsel, and increasingly the fractional general counsel, is evolving to address AI-specific risks. This includes regulatory compliance, ethical considerations, and the broader question of who is accountable when AI systems make decisions or take actions that impact the organization. On the technology front, we’re seeing the emergence of dedicated security layers for AI agents. Trust3 AI, for example, has launched a security architecture focused specifically on managing risks associated with autonomous AI agents. The goal is to provide granular control and oversight, recognizing that AI agents require more than just traditional IT controls. This is an important development, reflecting a broader recognition that AI security is a specialized discipline requiring its own tools and frameworks. So, what are the strategic implications for organizations navigating this rapidly evolving landscape? First, vulnerability management and rapid patching must be prioritized over traditional credential-centric defenses. The data is clear: attackers are exploiting vulnerabilities faster than ever, and organizations that can’t keep up are at heightened risk. Second, software supply chain security is now a board-level concern. The GitHub breach is just the latest example of how compromised code repositories can have far-reaching consequences. Continuous monitoring, third-party risk assessments, and secure development practices are essential. Third, AI governance framewor