<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Lakera bulletin - This week in AI in AI Agents Security</title>
    <link>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-bulletin-This-week-in-AI/m-p/260988#M23</link>
    <description>&lt;P&gt;All great points Val.&lt;/P&gt;</description>
    <pubDate>Mon, 27 Oct 2025 09:07:49 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-10-27T09:07:49Z</dc:date>
    <item>
      <title>Lakera bulletin - This week in AI</title>
      <link>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-bulletin-This-week-in-AI/m-p/260974#M22</link>
      <description>&lt;DIV id="section_1724334609182" class="hse-section"&gt;
&lt;DIV class="hse-column-container"&gt;
&lt;DIV id="column_1724334609182_0" class="hse-column hse-size-12"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV id="section-0" class="hse-section"&gt;
&lt;DIV class="hse-column-container"&gt;
&lt;DIV id="column-0-0" class="hse-column hse-size-12"&gt;
&lt;P&gt;&lt;SPAN&gt;It’s been a busy week for AI security and infrastructure. From stealthy browser-based prompt injections to Microsoft and OpenAI staking claims on the “AI browser” frontier, the theme is clear: as AI moves deeper into our daily workflows, its attack surface expands.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We’re also spotlighting Lakera’s &lt;EM&gt;2025 GenAI Security Readiness Report&lt;/EM&gt;,&amp;nbsp;a reality check on how prepared organizations truly are for this new wave.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Let’s get into it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;AI Sidebar &amp;amp; Browser Extensions Can Be Abused&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;Researchers found that malicious browser extensions and sidebar features in AI-enhanced browsers can be used to spoof trusted AI assistants, steal credentials, and hijack browsing sessions,&amp;nbsp;exposing an overlooked threat vector as browsers evolve into AI platforms.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVS3Cq46jblSW1ZSSzc863xvFW8kTzPf5F170lN28qGwj5nXHCW6N1X8z6lZ3nwW4Yf5Gf8Bc9PTW8X5MLp6Jyr8QW2xs3R48_tbVPW7S-7ds4lfsv6W2-PCZP4Kpz0TW4KNCc62DFyMXW3FQ4ZB2Dm3gbW4nj6jR27vf7FW7CcHq229fw-mN7hksRdtL4SbW4l84l47BGh6XW7CKbjs19Cz2PW3pV1NF8kxczmW18DtNh2hl_51W2V9ZQM3dVh8SVZxyFl5Wg4q_W8LBPVl1x22HNW3j5N2P3v27ZcW3gpK6v6ZbfY7W4R-xYH8PzprpW1jhf0t5xxWNJW8kMh8N3-Wp55W8YFwt03qbYk7W66qR821fg_DnW4cQtq84rpcnMW8s5RQM2CdG5FW2pkGzp1k1k1_W3-XLCR2kS6bcW7Wx2jg6-H-TgW892Dw125G66xW7Sqgn-4nJB20W4FmGKt3WrfGlW5K52ln1S2C6xW8L6SWn5-ll4kW8vgfND1zfb8dW6jLpYy2Pj35LW4GX0N28vMNYzW6hhwdW5h-xklf2JCJGv04___.YzJlOmNwYWxsOmM6bzpmOWIzNzg1ZDk2N2ZkMzI0MWY4NWQyOTI3NTk0ZDUzMTo3Ojg1ZjE6OTMwYjRjMjRkNDg1OTJlMDAwN2ViYzEyYTBlMmEwNmFiNTBkMWU4OTE2ZDlmZWY1NzgxMDNmMGI3YTMwNmRhNjpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVS3Cq46jblSW1ZSSzc863xvFW8kTzPf5F170lN28qGwj5nXHCW6N1X8z6lZ3nwW4Yf5Gf8Bc9PTW8X5MLp6Jyr8QW2xs3R48_tbVPW7S-7ds4lfsv6W2-PCZP4Kpz0TW4KNCc62DFyMXW3FQ4ZB2Dm3gbW4nj6jR27vf7FW7CcHq229fw-mN7hksRdtL4SbW4l84l47BGh6XW7CKbjs19Cz2PW3pV1NF8kxczmW18DtNh2hl_51W2V9ZQM3dVh8SVZxyFl5Wg4q_W8LBPVl1x22HNW3j5N2P3v27ZcW3gpK6v6ZbfY7W4R-xYH8PzprpW1jhf0t5xxWNJW8kMh8N3-Wp55W8YFwt03qbYk7W66qR821fg_DnW4cQtq84rpcnMW8s5RQM2CdG5FW2pkGzp1k1k1_W3-XLCR2kS6bcW7Wx2jg6-H-TgW892Dw125G66xW7Sqgn-4nJB20W4FmGKt3WrfGlW5K52ln1S2C6xW8L6SWn5-ll4kW8vgfND1zfb8dW6jLpYy2Pj35LW4GX0N28vMNYzW6hhwdW5h-xklf2JCJGv04___.YzJlOmNwYWxsOmM6bzpmOWIzNzg1ZDk2N2ZkMzI0MWY4NWQyOTI3NTk0ZDUzMTo3Ojg1ZjE6OTMwYjRjMjRkNDg1OTJlMDAwN2ViYzEyYTBlMmEwNmFiNTBkMWU4OTE2ZDlmZWY1NzgxMDNmMGI3YTMwNmRhNjpoOlQ6Tg" target="_blank" rel="noopener" data-hs-link-id="0" data-hs-link-id-v2="HZ51pO+Z"&gt;Read the full story&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Prompt Injection via Hidden Instructions Hits AI Browsers&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;A new attack technique hides malicious instructions inside images and screenshots to hijack AI browsers such as Perplexity Comet. The exploit can bypass sanitization filters, underscoring the need for defensive layers against invisible prompt-based attacks.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVS3Cq46jblSW1ZSSzc863xvFW8kTzPf5F170lN28qGxv3qn9qW95jsWP6lZ3kPVsWjrQ62rRkBW5x4Hyf1fzfQJW4sHZ9P814pKnW7BB4Tv3DmD7HW5qmQSP3ymrdmW4N8bJ480qf_8VrlMg05hw939W6NJGNV3lS8dPW8BJkgL51RhCcW3hCZSb7kLjGCW3MyYCr669HysW1vpKKx3bPSrGW87sKXy4WS6gNW2dc3CB4fgDyqVxklZX4_4BxpW2By71b4K9-kbW3dv7-S3dvNn6W22V7rW3sdZ-QW45xXd_3tNlH-W4LB_Gq184RC2W2vQGvx7GZTXNW7PZp9l1qNQRlW5dShY93wLxDWW7nh-194SSN5gW5wg0ws9fcscxW4t6BZM6fDsP7W1vHX5_7c9rQ8V8m4Z35Vm7nXW3G0x8J2Vlpc2W1vBHFN4tc6kGf4d0hTW04___.YzJlOmNwYWxsOmM6bzpmOWIzNzg1ZDk2N2ZkMzI0MWY4NWQyOTI3NTk0ZDUzMTo3OmE4NTk6ZjM3MzYwYTM5ZWIyZjc0NGQ2NDE1MmIwN2FlMDlhNTU1NTNjYWI0ODAyMjlkZGM1ZGZiNjY3OWJmYTQwOTViOTpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVS3Cq46jblSW1ZSSzc863xvFW8kTzPf5F170lN28qGxv3qn9qW95jsWP6lZ3kPVsWjrQ62rRkBW5x4Hyf1fzfQJW4sHZ9P814pKnW7BB4Tv3DmD7HW5qmQSP3ymrdmW4N8bJ480qf_8VrlMg05hw939W6NJGNV3lS8dPW8BJkgL51RhCcW3hCZSb7kLjGCW3MyYCr669HysW1vpKKx3bPSrGW87sKXy4WS6gNW2dc3CB4fgDyqVxklZX4_4BxpW2By71b4K9-kbW3dv7-S3dvNn6W22V7rW3sdZ-QW45xXd_3tNlH-W4LB_Gq184RC2W2vQGvx7GZTXNW7PZp9l1qNQRlW5dShY93wLxDWW7nh-194SSN5gW5wg0ws9fcscxW4t6BZM6fDsP7W1vHX5_7c9rQ8V8m4Z35Vm7nXW3G0x8J2Vlpc2W1vBHFN4tc6kGf4d0hTW04___.YzJlOmNwYWxsOmM6bzpmOWIzNzg1ZDk2N2ZkMzI0MWY4NWQyOTI3NTk0ZDUzMTo3OmE4NTk6ZjM3MzYwYTM5ZWIyZjc0NGQ2NDE1MmIwN2FlMDlhNTU1NTNjYWI0ODAyMjlkZGM1ZGZiNjY3OWJmYTQwOTViOTpoOlQ6Tg" target="_blank" rel="noopener" data-hs-link-id="0" data-hs-link-id-v2="Nbi5FjvO"&gt;See Brave’s analysis&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Zero-Day SharePoint Exploit Used by Chinese Threat Actors&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;A patched Microsoft SharePoint vulnerability (CVE-2025-53770) was recently exploited by multiple Chinese threat actors to breach global telecom and government networks. The campaign highlights the continuing risk of delayed patching in enterprise environments.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVS3Cq46jblSW1ZSSzc863xvFW8kTzPf5F170lN28qGvK5nXHCW5BWr2F6lZ3lSVgthpV4tCns-W4WwMYD7SD9NkW1tdB064CntXPW5Bp6_-2wCY2KW2qlkW5923JR8Vj5zRR1wfDMlW70-XYQ4Mv4VDTp5s67WB9glW8Tzzfj9g4rFGW43g_FC7S3PBLW8pSgyj7Svc44W7nZytw28w3ynW97z5Pw3m6JZpW7lZYJv6gknxhVjRfJ56Lvmv9W8Vt9JX6DbGy-W36mjWG1h5VFhW1D7jmd7ymD_BW5LJwKS1kQd1SVf8jy61hGVx0Vfnzwx6Rn8KQVs937s8jqbQXN78ntJx2zbsbW8gHx9H6Vnm52W20jshH1wYZbxW3g4rym6Dd7_KW2l1JJ4813BzXN8JVcn9VbB3tV9SJRp5MjK_2W6l-MZj5fJdYNW8zhm836FXHZWW6dLS6Q7dqhhmW7s90TH6R94YMW4tnSZ78NQlNYf8DJhpT04___.YzJlOmNwYWxsOmM6bzpmOWIzNzg1ZDk2N2ZkMzI0MWY4NWQyOTI3NTk0ZDUzMTo3OmNkMWM6NTZkZjM1NGQ0N2RmZmU5NDczOGFkOWI0MjQwZDdmNmFhNTQyOGU3ODBjODMwMGM4MDFiMjUwYTIwMTE2ODFiYTpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVS3Cq46jblSW1ZSSzc863xvFW8kTzPf5F170lN28qGvK5nXHCW5BWr2F6lZ3lSVgthpV4tCns-W4WwMYD7SD9NkW1tdB064CntXPW5Bp6_-2wCY2KW2qlkW5923JR8Vj5zRR1wfDMlW70-XYQ4Mv4VDTp5s67WB9glW8Tzzfj9g4rFGW43g_FC7S3PBLW8pSgyj7Svc44W7nZytw28w3ynW97z5Pw3m6JZpW7lZYJv6gknxhVjRfJ56Lvmv9W8Vt9JX6DbGy-W36mjWG1h5VFhW1D7jmd7ymD_BW5LJwKS1kQd1SVf8jy61hGVx0Vfnzwx6Rn8KQVs937s8jqbQXN78ntJx2zbsbW8gHx9H6Vnm52W20jshH1wYZbxW3g4rym6Dd7_KW2l1JJ4813BzXN8JVcn9VbB3tV9SJRp5MjK_2W6l-MZj5fJdYNW8zhm836FXHZWW6dLS6Q7dqhhmW7s90TH6R94YMW4tnSZ78NQlNYf8DJhpT04___.YzJlOmNwYWxsOmM6bzpmOWIzNzg1ZDk2N2ZkMzI0MWY4NWQyOTI3NTk0ZDUzMTo3OmNkMWM6NTZkZjM1NGQ0N2RmZmU5NDczOGFkOWI0MjQwZDdmNmFhNTQyOGU3ODBjODMwMGM4MDFiMjUwYTIwMTE2ODFiYTpoOlQ6Tg" target="_blank" rel="noopener" data-hs-link-id="0" data-hs-link-id-v2="3l8TcITG"&gt;Read more at The Hacker News&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Supply-Chain Risks Raise Red Flags After F5 Networks Breach&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;F5 Networks, a major cybersecurity vendor,&amp;nbsp;confirmed a year-long intrusion that may have exposed enterprise and AI-infrastructure customers. Experts warn this could be one of the most consequential supply-chain breaches in years.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVS3Cq46jblSW1ZSSzc863xvFW8kTzPf5F170lN28qGwC5nXHCW7lCGcx6lZ3nrW4FW7Fq5GrWZtW4sw3zD7VPfd9W6dFG7351g4ySW4rH8GQ6bg72FW7mgjYz1GY-2-W33kvdk97vtL3W2l1hkg6Jkk9TVTxqnC4GLqx2W2gBKGP5THH1bW5p9jCs10JhnSW73-wC-3-3Rq_N4j__LYt0c3-W1G69M95cLPW8W2sYJxJ80CjdMN4t1SjB1W6lBW89hbtr5Dllz8W6KNtVZ4mbr5GN1GF3qDn8QLHN8H5yGy38RqmW5kyT5r7DFF4tW2gxG0m75VRnKN5xxdYWCxSq2W4_hWFY6W-HgdV8zbZp2B2ZTKW5NFCh_33nr9tW5767y86_XXt6W4112HK5Jbp0KW40_nyz2c-rJXW2k_ddp3qD_ZBW412Kpx2MhBl4W2tRWPw4KHc7xN1n09MjZQ1sMW9k37Wp2ngDhzV5FP2b5gmwYsVHN0GN7Sx-xbW4xZ09C2nynCXW9gsR_K1lMr9JN554gq3DZ1RDW1_L38C96MRYHW7fKgPM8mM50zf313s-W04___.YzJlOmNwYWxsOmM6bzpmOWIzNzg1ZDk2N2ZkMzI0MWY4NWQyOTI3NTk0ZDUzMTo3OjY5NWQ6M2RlNzI4NjY3YTZkYzdhNjMxOTA0MDE5ODFkMjg5MjUyMjkxZjJjYzc1ZWI3NmRmYjk2YTVmMTcwMTEwMzFiMzpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVS3Cq46jblSW1ZSSzc863xvFW8kTzPf5F170lN28qGwC5nXHCW7lCGcx6lZ3nrW4FW7Fq5GrWZtW4sw3zD7VPfd9W6dFG7351g4ySW4rH8GQ6bg72FW7mgjYz1GY-2-W33kvdk97vtL3W2l1hkg6Jkk9TVTxqnC4GLqx2W2gBKGP5THH1bW5p9jCs10JhnSW73-wC-3-3Rq_N4j__LYt0c3-W1G69M95cLPW8W2sYJxJ80CjdMN4t1SjB1W6lBW89hbtr5Dllz8W6KNtVZ4mbr5GN1GF3qDn8QLHN8H5yGy38RqmW5kyT5r7DFF4tW2gxG0m75VRnKN5xxdYWCxSq2W4_hWFY6W-HgdV8zbZp2B2ZTKW5NFCh_33nr9tW5767y86_XXt6W4112HK5Jbp0KW40_nyz2c-rJXW2k_ddp3qD_ZBW412Kpx2MhBl4W2tRWPw4KHc7xN1n09MjZQ1sMW9k37Wp2ngDhzV5FP2b5gmwYsVHN0GN7Sx-xbW4xZ09C2nynCXW9gsR_K1lMr9JN554gq3DZ1RDW1_L38C96MRYHW7fKgPM8mM50zf313s-W04___.YzJlOmNwYWxsOmM6bzpmOWIzNzg1ZDk2N2ZkMzI0MWY4NWQyOTI3NTk0ZDUzMTo3OjY5NWQ6M2RlNzI4NjY3YTZkYzdhNjMxOTA0MDE5ODFkMjg5MjUyMjkxZjJjYzc1ZWI3NmRmYjk2YTVmMTcwMTEwMzFiMzpoOlQ6Tg" target="_blank" rel="noopener" data-hs-link-id="0" data-hs-link-id-v2="JwwQj/5i"&gt;Read the report&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;DeepSeek Opens Up Text-to-Image Compression Model for Longer Context Windows&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;DeepSeek released an open-weight model, &lt;EM&gt;DeepSeek-OCR&lt;/EM&gt;, that compresses text through image representation 10× more efficiently,&amp;nbsp;paving the way for LLMs capable of tens of millions of tokens in context.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVS3Cq46jblSW1ZSSzc863xvFW8kTzPf5F170lN28qGw05nXHCW69t95C6lZ3p-N4cZwm7DzHBPW4Hp7S-4zt9QKN58NXnkddX1tW1Q90Bw8MMc3fW7F4QTn1BDjSYW3dTnzY4NgVBdW1b6--z6PZvs4W8cJtBm8Yz30vW5NzdQG2H2tVTW4kNvbm4V4z8XW5D6dX61dLX-NN5CjKfpHTxw7W4tLQbs5LwlmRW5Sr2CM4_4dmhW8HGv8M2WVlQ2W6K1yqy7w97QVW1_rhx753tSSBW7gbWqF7HVgy_W5kySf75JvzTnW8sYpmQ7CPl_xW3gscN183zjV4V3wF0Q1TKxl9W1B99FT7pFRLBVxypQV2d888rV9mlll4QPcSwVR3P-N6Wgy8WN3gzVFGD0LzxW8J5-kF5MX7skW7W9DTM6cDLFvV_zdZ-5PHy_GW7Z3X8r63xnK3W6nBdZv4z3GMVW2Ttqgc284fFqW12mbcD7h6L2hW4prPYv1xsR5cW68MYrC2lhq2ff2RHQtg04___.YzJlOmNwYWxsOmM6bzpmOWIzNzg1ZDk2N2ZkMzI0MWY4NWQyOTI3NTk0ZDUzMTo3OmUwNzc6YWNhZDZlYzZhNzA1MDE3YzhhOGMzY2Q5ZTJhMDUxNWRiNWRlOWYzOTQ4ZjQ4NjZkZTFjZmFhM2RlYTdkMWU2ZTpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVS3Cq46jblSW1ZSSzc863xvFW8kTzPf5F170lN28qGw05nXHCW69t95C6lZ3p-N4cZwm7DzHBPW4Hp7S-4zt9QKN58NXnkddX1tW1Q90Bw8MMc3fW7F4QTn1BDjSYW3dTnzY4NgVBdW1b6--z6PZvs4W8cJtBm8Yz30vW5NzdQG2H2tVTW4kNvbm4V4z8XW5D6dX61dLX-NN5CjKfpHTxw7W4tLQbs5LwlmRW5Sr2CM4_4dmhW8HGv8M2WVlQ2W6K1yqy7w97QVW1_rhx753tSSBW7gbWqF7HVgy_W5kySf75JvzTnW8sYpmQ7CPl_xW3gscN183zjV4V3wF0Q1TKxl9W1B99FT7pFRLBVxypQV2d888rV9mlll4QPcSwVR3P-N6Wgy8WN3gzVFGD0LzxW8J5-kF5MX7skW7W9DTM6cDLFvV_zdZ-5PHy_GW7Z3X8r63xnK3W6nBdZv4z3GMVW2Ttqgc284fFqW12mbcD7h6L2hW4prPYv1xsR5cW68MYrC2lhq2ff2RHQtg04___.YzJlOmNwYWxsOmM6bzpmOWIzNzg1ZDk2N2ZkMzI0MWY4NWQyOTI3NTk0ZDUzMTo3OmUwNzc6YWNhZDZlYzZhNzA1MDE3YzhhOGMzY2Q5ZTJhMDUxNWRiNWRlOWYzOTQ4ZjQ4NjZkZTFjZmFhM2RlYTdkMWU2ZTpoOlQ6Tg" target="_blank" rel="noopener" data-hs-link-id="0" data-hs-link-id-v2="p0+Ya6nr"&gt;Explore the announcement&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Microsoft Copilot and Edge Get Major Fall Update: The “AI Browser” Era Begins&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;Microsoft rolled out 12 new Copilot features, including “Copilot Mode” in Edge that transforms browsing into a fully AI-assisted workspace,&amp;nbsp;with voice control, multi-tab context, and history-aware recall.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVS3Cq46jblSW1ZSSzc863xvFW8kTzPf5F170lN28qGvK5nXHCW5BWr2F6lZ3mjN19Kd9gdK-QkW1RZqRg6XclJnW58n5zm8lJrwGW5qrZZd92QrDzW683_BQ8V6CmyW4FCT4j2cKWHLV2XQq_6qrBBRW6l13P83-8D8-W93pzsS8GVgdnW52zLzv1s4tN_VvkfML2RFgtyW8f-PSk8xck1CW8trvn_4K3TK0W1yfDPM1M9mNYW911ycX4fz6h0W5_fHSF4rMkDyW2k-0Cn3Ybv8QN3KVXsCS8fn4W1nTpLg4N7X7_N7mXky_4Fwg8W6RxrTJ7S5m4yW4CTL0V5K3nkKVc2_Nn8WyCGdW28_nxM7BzrhTW871N0G7sQf6fW785d8J7P8hfzW6BgKR53xYtKQW4jyj-81CHskgW7jtMLH6NFD5TW5D9xJQ4zdvhYW78vGmr8yMZrCW6Yt8C82bNKvTVkhK_z2sw1TtN3m9QwcNl41vf7cNbPn04___.YzJlOmNwYWxsOmM6bzpmOWIzNzg1ZDk2N2ZkMzI0MWY4NWQyOTI3NTk0ZDUzMTo3OmIyMmU6M2IzZjRlNmJmYWJjZjI2Mzk2MjRjMGQ5ZDg0YmRmOTVmY2JmOWYyZTIzOTcxNjgwMjM1NmI2ZDY1YWE0ODZiYjpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVS3Cq46jblSW1ZSSzc863xvFW8kTzPf5F170lN28qGvK5nXHCW5BWr2F6lZ3mjN19Kd9gdK-QkW1RZqRg6XclJnW58n5zm8lJrwGW5qrZZd92QrDzW683_BQ8V6CmyW4FCT4j2cKWHLV2XQq_6qrBBRW6l13P83-8D8-W93pzsS8GVgdnW52zLzv1s4tN_VvkfML2RFgtyW8f-PSk8xck1CW8trvn_4K3TK0W1yfDPM1M9mNYW911ycX4fz6h0W5_fHSF4rMkDyW2k-0Cn3Ybv8QN3KVXsCS8fn4W1nTpLg4N7X7_N7mXky_4Fwg8W6RxrTJ7S5m4yW4CTL0V5K3nkKVc2_Nn8WyCGdW28_nxM7BzrhTW871N0G7sQf6fW785d8J7P8hfzW6BgKR53xYtKQW4jyj-81CHskgW7jtMLH6NFD5TW5D9xJQ4zdvhYW78vGmr8yMZrCW6Yt8C82bNKvTVkhK_z2sw1TtN3m9QwcNl41vf7cNbPn04___.YzJlOmNwYWxsOmM6bzpmOWIzNzg1ZDk2N2ZkMzI0MWY4NWQyOTI3NTk0ZDUzMTo3OmIyMmU6M2IzZjRlNmJmYWJjZjI2Mzk2MjRjMGQ5ZDg0YmRmOTVmY2JmOWYyZTIzOTcxNjgwMjM1NmI2ZDY1YWE0ODZiYjpoOlQ6Tg" target="_blank" rel="noopener" data-hs-link-id="0" data-hs-link-id-v2="oP3W6C2B"&gt;Read the Microsoft announcement&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;OpenAI Launches ChatGPT Atlas&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;OpenAI introduced ChatGPT Atlas, a new AI-powered web browser built around ChatGPT. Atlas combines conversational browsing, “Agent Mode” for task automation, and optional on-device memory,&amp;nbsp;now available for macOS, with Windows, iOS, and Android on the way.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVS3Cq46jblSW1ZSSzc863xvFW8kTzPf5F170lN28qGxv3qn9qW95jsWP6lZ3phW9hNYft3D8BCXW7ynwpV1mkb1rW71CMf36VC3SQN6mPQ0m3LBGrW3PrNGz5JJyRfW7rBDV95VY-KRW4rdPCG8Zs6qhN6mWw4Hv-WBNW6gDphR6wKsRjW8bFxbp2f25NxW4J6Dr546Bv2pW2PNgz14nnkYMVBZsqB5p0RLyW6Pqv_z7XBc6kW4DQpsd19t-2dW4_QWrX8hXlMVN6SV1F4m93QTW1CNSs64NF9wHV1rZwM1pzR-3W2rX6658_vMNvW7nGf_d2lL3phW1Vcwmx13s7GVN2c68KZGQkxHW5xDDvn5npCRBVXGT9D46c6FQW4zxX348jpJnnW8cYcfP7RXY5DW3tHzj415BmgyW7pRv7s6xhzB1W5djfJX31QRfDf7Y_bXb04___.YzJlOmNwYWxsOmM6bzpmOWIzNzg1ZDk2N2ZkMzI0MWY4NWQyOTI3NTk0ZDUzMTo3OjE5Y2M6YTczNDFhNmE1YzAyMjI0YmNmZGVjYzNhMGRlOTk3MGRhZTZlYzAyMDM1Yjk1MDNhMWJlYWJmODExMjRiMTAxZjpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVS3Cq46jblSW1ZSSzc863xvFW8kTzPf5F170lN28qGxv3qn9qW95jsWP6lZ3phW9hNYft3D8BCXW7ynwpV1mkb1rW71CMf36VC3SQN6mPQ0m3LBGrW3PrNGz5JJyRfW7rBDV95VY-KRW4rdPCG8Zs6qhN6mWw4Hv-WBNW6gDphR6wKsRjW8bFxbp2f25NxW4J6Dr546Bv2pW2PNgz14nnkYMVBZsqB5p0RLyW6Pqv_z7XBc6kW4DQpsd19t-2dW4_QWrX8hXlMVN6SV1F4m93QTW1CNSs64NF9wHV1rZwM1pzR-3W2rX6658_vMNvW7nGf_d2lL3phW1Vcwmx13s7GVN2c68KZGQkxHW5xDDvn5npCRBVXGT9D46c6FQW4zxX348jpJnnW8cYcfP7RXY5DW3tHzj415BmgyW7pRv7s6xhzB1W5djfJX31QRfDf7Y_bXb04___.YzJlOmNwYWxsOmM6bzpmOWIzNzg1ZDk2N2ZkMzI0MWY4NWQyOTI3NTk0ZDUzMTo3OjE5Y2M6YTczNDFhNmE1YzAyMjI0YmNmZGVjYzNhMGRlOTk3MGRhZTZlYzAyMDM1Yjk1MDNhMWJlYWJmODExMjRiMTAxZjpoOlQ6Tg" target="_blank" rel="noopener" data-hs-link-id="0" data-hs-link-id-v2="27BgFZEN"&gt;Read the official announcement&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;ICYMI: Lakera’s 2025 GenAI Security Readiness Report&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;Lakera’s new report offers one of the most comprehensive looks yet at how organizations are adapting to the realities of GenAI risk.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Key findings: 15% of companies faced a GenAI-related security incident this year; only 4% report high confidence in their defenses; and talent shortages remain the top barrier to preparedness.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The message is clear:&amp;nbsp;generative AI adoption is accelerating faster than the guardrails to secure it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":backhand_index_pointing_right:"&gt;👉&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVS3Cq46jblSW1ZSSzc863xvFW8kTzPf5F170lN28qGxv3qn9qW95jsWP6lZ3q2W5zllTD2_3tBmW8lnjWn84qx72W1QdwsF8Px9LyW4VHwh86p_310W3KWTVy8wMVylW7tQMYD5lDjc0W4cLK302xFlrlW4P5wRv95frxWW8N82Ry6MfLxqW1hWQP72KXhBNN7r6wf1Kvw_DW326P5Y2Jl_wjVCtNFF544gQjN4rrpNlGWTxsW8dnjv063_J2-W31tGPX4l-nfcW1sXDQK8LTHwcW6XVD8b78Nh3vVbRpWX5CMTvTVDzY8v7WhvlMW51XJgr6FSsGSW3dxY8W3z2TfrW9kNjFC6f0hDtVpTxbt5PM7--W5ZFtWY8Gj_38W7bfQN23ymM7PW2d0WSY1jj09tVmm5QW2vkypBVrt6X077qx2JN416T4Nx9BCHf1dYbLg04___.YzJlOmNwYWxsOmM6bzpmOWIzNzg1ZDk2N2ZkMzI0MWY4NWQyOTI3NTk0ZDUzMTo3OjE1Y2Y6MDRhN2Y5YjUzNDRkYjBiZTEyYWIxMjJlOWNlMGY3ODg4M2E0MWEwMDhjMTBmOTgyNmU2YWRhNWIxZGRiNjk1NzpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVS3Cq46jblSW1ZSSzc863xvFW8kTzPf5F170lN28qGxv3qn9qW95jsWP6lZ3q2W5zllTD2_3tBmW8lnjWn84qx72W1QdwsF8Px9LyW4VHwh86p_310W3KWTVy8wMVylW7tQMYD5lDjc0W4cLK302xFlrlW4P5wRv95frxWW8N82Ry6MfLxqW1hWQP72KXhBNN7r6wf1Kvw_DW326P5Y2Jl_wjVCtNFF544gQjN4rrpNlGWTxsW8dnjv063_J2-W31tGPX4l-nfcW1sXDQK8LTHwcW6XVD8b78Nh3vVbRpWX5CMTvTVDzY8v7WhvlMW51XJgr6FSsGSW3dxY8W3z2TfrW9kNjFC6f0hDtVpTxbt5PM7--W5ZFtWY8Gj_38W7bfQN23ymM7PW2d0WSY1jj09tVmm5QW2vkypBVrt6X077qx2JN416T4Nx9BCHf1dYbLg04___.YzJlOmNwYWxsOmM6bzpmOWIzNzg1ZDk2N2ZkMzI0MWY4NWQyOTI3NTk0ZDUzMTo3OjE1Y2Y6MDRhN2Y5YjUzNDRkYjBiZTEyYWIxMjJlOWNlMGY3ODg4M2E0MWEwMDhjMTBmOTgyNmU2YWRhNWIxZGRiNjk1NzpoOlQ6Tg" target="_blank" rel="noopener" data-hs-link-id="0" data-hs-link-id-v2="7SKY2d6G"&gt;Read the full Lakera 2025 GenAI Security Readiness Report&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;From new browser threats to infrastructure breaches, and a sobering look at enterprise readiness,&amp;nbsp;this week’s stories reveal both the promise and fragility of AI’s next chapter.&lt;/P&gt;
&lt;P&gt;See you next week!&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 27 Oct 2025 07:59:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-bulletin-This-week-in-AI/m-p/260974#M22</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-10-27T07:59:48Z</dc:date>
    </item>
    <item>
      <title>Re: Lakera bulletin - This week in AI</title>
      <link>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-bulletin-This-week-in-AI/m-p/260988#M23</link>
      <description>&lt;P&gt;All great points Val.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Oct 2025 09:07:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-bulletin-This-week-in-AI/m-p/260988#M23</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-27T09:07:49Z</dc:date>
    </item>
  </channel>
</rss>

