<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Lakera bulletin - This week in AI - Nov 24, 2025 in AI Agents Security</title>
    <link>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-bulletin-This-week-in-AI-Nov-24-2025/m-p/263542#M30</link>
    <description>&lt;P&gt;&lt;SPAN&gt;It has been a week of big moves across the AI stack, from real attacks on ML infrastructure to new open models and fresh frontier releases. We also saw protocol updates that will shape how agents operate, plus shifts in public-sector AI and leadership changes at the top of the research world. &lt;/SPAN&gt;&lt;SPAN&gt;There is a lot happening at once, and much of it sits right at the intersection of capability and security.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-start="781" data-end="801"&gt;&lt;SPAN&gt;Let’s get into it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-start="803" data-end="864"&gt;&lt;SPAN&gt;Ray Framework Exploited in Global Cryptojacking Campaign&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-start="865" data-end="1351"&gt;&lt;SPAN&gt;A two year old vulnerability in the Ray AI framework is being actively exploited in a campaign that hijacks exposed clusters for cryptomining and botnet operations. The activity highlights how quickly attackers move when machine learning infrastructure is deployed without authentication, proper access controls, or basic exposure checks.&lt;/SPAN&gt;&lt;BR data-start="1203" data-end="1206" /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwQs5nXHCW69t95C6lZ3q6W6QNY5G6GrypmW7jGCkr6MM9PLV70lxy10gSB6W7zn1-W8MrDsHW4rk2WJ57LT40W7-DbV_8bG0nCW7q2hRM48rBr-W8j6tbT4Gms4yW1jsvvp4-BzRhW24BTDG8phwQqW4gcSJD4kkkzNW6wyWZ41R4dX8W64-tgs35LLNJW68PD1T5zHbMBN5SfwvxctY52W1rtXTN8f0qDMW5M9zCn1-ybYbW1j9Z9Z59mkMQW8FqrVZ30FT04W6F2pBX1HCjGZW8rx9nW1GRMSMW39V2ZP67WbP5V4xXGg7FcnFvW4jRNFy7j1Y6JW4cbK8D3XBHMfW3zmWwJ1htmJbW7RCzrp5KnqKmW8BTFVb6cX4F7N2MXLlpD2fKwW2qJ09P3rD243VbWbT-4-ySlbMYWhS_zVCZTW3SDxyj7Pdd7fVXNjBH3mnFyWW1gzCMx6Ym6dBW8HJ-mg6t0W-Pf7XDDc204___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OjdlMmY6ZjVmODQwOTkxOTE5NzJhYWM3ZmNhNzEzYTM1Zjg5ZDFiYjY4M2RiN2E5OTg0MDNmMzYyNTgyMzkxMDdhOWU1OTpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwQs5nXHCW69t95C6lZ3q6W6QNY5G6GrypmW7jGCkr6MM9PLV70lxy10gSB6W7zn1-W8MrDsHW4rk2WJ57LT40W7-DbV_8bG0nCW7q2hRM48rBr-W8j6tbT4Gms4yW1jsvvp4-BzRhW24BTDG8phwQqW4gcSJD4kkkzNW6wyWZ41R4dX8W64-tgs35LLNJW68PD1T5zHbMBN5SfwvxctY52W1rtXTN8f0qDMW5M9zCn1-ybYbW1j9Z9Z59mkMQW8FqrVZ30FT04W6F2pBX1HCjGZW8rx9nW1GRMSMW39V2ZP67WbP5V4xXGg7FcnFvW4jRNFy7j1Y6JW4cbK8D3XBHMfW3zmWwJ1htmJbW7RCzrp5KnqKmW8BTFVb6cX4F7N2MXLlpD2fKwW2qJ09P3rD243VbWbT-4-ySlbMYWhS_zVCZTW3SDxyj7Pdd7fVXNjBH3mnFyWW1gzCMx6Ym6dBW8HJ-mg6t0W-Pf7XDDc204___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OjdlMmY6ZjVmODQwOTkxOTE5NzJhYWM3ZmNhNzEzYTM1Zjg5ZDFiYjY4M2RiN2E5OTg0MDNmMzYyNTgyMzkxMDdhOWU1OTpoOlQ6Tg" target="_blank" rel="noopener" data-start="1209" data-end="1349" data-hs-link-id="0" data-hs-link-id-v2="KfIvcnC7"&gt;Read the full story&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-start="1353" data-end="1415"&gt;&lt;SPAN&gt;Allen Institute for AI Releases Olmo 3 Open Weight Models&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-start="1416" data-end="1763"&gt;&lt;SPAN&gt;The Allen Institute for AI has introduced Olmo 3, a new open weight model family designed to offer strong performance and full transparency for researchers and developers. The release expands the set of models that teams can inspect, customize, and self host without license friction.&lt;/SPAN&gt;&lt;BR data-start="1700" data-end="1703" /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwRF3qn9qW8wLKSR6lZ3nPW2T4cxr5RzgdqN3DLcXltP32MW9f_Q2n2B_DZsW8yvV1T2NYVTdW5TB3DX9fcLH2W77SH6X79jt9WW8-wFyc5HHwh3W5g0lnD7VG-tsW98qPft13pTYTW4mcD9p3sLwglW6VRgN58YzmwGW35YD2T1nT31DW7C8rHm1XkVqQW44z6gj61WQV3W3_XZzj5sBxlYW84cT3Q3fJRv6VFRw5z6Pbd1pW2B0mz83qhYJNW6z4QDv8FjwBMW24zrr37yN5zSW4GplVS27d375W9dpZGT8NjlHnW2hR_83891wCsW3S2_rP1p6DJVW6zwSDH8Zz7-fW5hhcjz34Gcg7W5l616t7Q-ZZVV5Y7k73cQq6Df35S3F004___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmEyMmE6NGExZWI4YmRjZjVhZGNlNWNjYjc2Mjg4NzI4ZmY0ZDQ3ZmRkNGU4OWI3NTkzODJkY2U0Mzc1OTg5YjViNGRmYjpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwRF3qn9qW8wLKSR6lZ3nPW2T4cxr5RzgdqN3DLcXltP32MW9f_Q2n2B_DZsW8yvV1T2NYVTdW5TB3DX9fcLH2W77SH6X79jt9WW8-wFyc5HHwh3W5g0lnD7VG-tsW98qPft13pTYTW4mcD9p3sLwglW6VRgN58YzmwGW35YD2T1nT31DW7C8rHm1XkVqQW44z6gj61WQV3W3_XZzj5sBxlYW84cT3Q3fJRv6VFRw5z6Pbd1pW2B0mz83qhYJNW6z4QDv8FjwBMW24zrr37yN5zSW4GplVS27d375W9dpZGT8NjlHnW2hR_83891wCsW3S2_rP1p6DJVW6zwSDH8Zz7-fW5hhcjz34Gcg7W5l616t7Q-ZZVV5Y7k73cQq6Df35S3F004___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmEyMmE6NGExZWI4YmRjZjVhZGNlNWNjYjc2Mjg4NzI4ZmY0ZDQ3ZmRkNGU4OWI3NTkzODJkY2U0Mzc1OTg5YjViNGRmYjpoOlQ6Tg" target="_new" rel="noopener" data-start="1706" data-end="1761" data-hs-link-id="0" data-hs-link-id-v2="dIpvkPHf"&gt;Read the announcement&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-start="1765" data-end="1794"&gt;&lt;SPAN&gt;Google Launches Gemini 3&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-start="1795" data-end="2239"&gt;&lt;SPAN&gt;Google has released Gemini 3 with improved multimodal reasoning, a new Deep Think mode, and tighter integration into Google's apps and services. As frontier models continue to embed themselves into enterprise and consumer workflows, security teams will need to monitor the growing number of pathways these systems use to access data and tools.&lt;/SPAN&gt;&lt;BR data-start="2138" data-end="2141" /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwRY3qn9qW95jsWP6lZ3lPW2YT3L64W2QKTN5CRByP89dW4W8Vmmzh3P27mZW36kPY_7BcyMsW46KJn36QW0gmVwvb6m7Z0BV4W1q8MjK3mykSsW6dFkL-3Z5x2dW5JZFKw6LBDWtV9DLrr5xYghBW4sqd7x6g4p-KN7cpz6Kt3HpHW6v6Kf52dQ31GW7P3Jqz8CpsqBW7Q8vsV8vSW68W3fDDGm7XNp1PW8dd8bb3X_CM9W6kcCFR3rQ3V1W2dKMRM2-bRLXW7zHkd_6H4fgbW7ZnzVK7XQqYDW78r_LW5vCdLSVJbwKw41b3znW4hmsXx3Wp3-2W7jz_8x6W752hW9cCjjM7zNfh2W8tp2tT68Lxk3VxZQQ394TzngW4zS22b5Qq88vW4BMv4f5g4d4Qf3Js1Pj04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmJkMDg6YzZhN2IwN2E3MjU3OWZlNDM1MTIyYzI2ZjIwNGFmNzFkN2I4YTI3MWNlMGZlNzA2YjBkY2RlODZmMDZkNjRlYzpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwRY3qn9qW95jsWP6lZ3lPW2YT3L64W2QKTN5CRByP89dW4W8Vmmzh3P27mZW36kPY_7BcyMsW46KJn36QW0gmVwvb6m7Z0BV4W1q8MjK3mykSsW6dFkL-3Z5x2dW5JZFKw6LBDWtV9DLrr5xYghBW4sqd7x6g4p-KN7cpz6Kt3HpHW6v6Kf52dQ31GW7P3Jqz8CpsqBW7Q8vsV8vSW68W3fDDGm7XNp1PW8dd8bb3X_CM9W6kcCFR3rQ3V1W2dKMRM2-bRLXW7zHkd_6H4fgbW7ZnzVK7XQqYDW78r_LW5vCdLSVJbwKw41b3znW4hmsXx3Wp3-2W7jz_8x6W752hW9cCjjM7zNfh2W8tp2tT68Lxk3VxZQQ394TzngW4zS22b5Qq88vW4BMv4f5g4d4Qf3Js1Pj04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmJkMDg6YzZhN2IwN2E3MjU3OWZlNDM1MTIyYzI2ZjIwNGFmNzFkN2I4YTI3MWNlMGZlNzA2YjBkY2RlODZmMDZkNjRlYzpoOlQ6Tg" target="_blank" rel="noopener" data-start="2144" data-end="2237" data-hs-link-id="0" data-hs-link-id-v2="pPhoBD0j"&gt;Read the announcement&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-start="2241" data-end="2294"&gt;&lt;SPAN&gt;Sweden Suspends Biased ML Fraud Detection System&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-start="2295" data-end="2857"&gt;&lt;SPAN&gt;Sweden’s social insurance agency has suspended an AI system used to flag potential benefit fraud after an investigation found that the model disproportionately targeted women, immigrants, and lower income groups. The decision underscores how quickly automated decisions can shape public policy, and why continuous evaluation and transparency are essential when governments deploy machine learning systems.&lt;/SPAN&gt;&lt;BR data-start="2700" data-end="2703" /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwQM5nXHCW6N1X8z6lZ3nvW3DV4M97mnLpNW7XCGyr3nbH49W3yXWvk8njB9vVZvX7n4XfDBfW4_-t0k1r-ZRfW4vSWqD50DpbkW792GcM5GNkj4W6GxmJ04N0vmcV651S06f8lfjW7lh1M25yN9tpW7DwbTm2tTtxWW7xLzvk4xjrJgN30_bjrRz5lHN8f0r78CFfJKW6c8ldr7Fb_yvW257jLD2P-TFnW2Tl-Wr8Z9wJ5W31DjkW670GNfMz_PM12ysRhW8sCfww1WTxPsW9gHkMg3gm1mNVQxPfJ12qJC0W43zcxV2dj731W4HCRML8TNhM3W7zyWdr5BFPs9W5F8t6S2hZzvbW5TpdT55lRPw1N1zVCJtHR26dW7wnLHv6QBs3vW7PsHfS1P1v5qW28PZdg2VLyWPW3MzCMj1X9YQFW32-0lw80wPDSW147ZGX3_9czHW45FPgv10B1WgW37Jcr94MT-r6W3WrcwG6j0vjHW1wxW-g3dgYBPf7kQj4W04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OjJhMzc6NzYxOTllZWNhMThkMGEzNDg2NmM0YWRhMjQ0MWM2Y2ZkMjhlMzY3NzkyOTY2NTcyZTRhZTA2YmQ4ODAxYzEzZDpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwQM5nXHCW6N1X8z6lZ3nvW3DV4M97mnLpNW7XCGyr3nbH49W3yXWvk8njB9vVZvX7n4XfDBfW4_-t0k1r-ZRfW4vSWqD50DpbkW792GcM5GNkj4W6GxmJ04N0vmcV651S06f8lfjW7lh1M25yN9tpW7DwbTm2tTtxWW7xLzvk4xjrJgN30_bjrRz5lHN8f0r78CFfJKW6c8ldr7Fb_yvW257jLD2P-TFnW2Tl-Wr8Z9wJ5W31DjkW670GNfMz_PM12ysRhW8sCfww1WTxPsW9gHkMg3gm1mNVQxPfJ12qJC0W43zcxV2dj731W4HCRML8TNhM3W7zyWdr5BFPs9W5F8t6S2hZzvbW5TpdT55lRPw1N1zVCJtHR26dW7wnLHv6QBs3vW7PsHfS1P1v5qW28PZdg2VLyWPW3MzCMj1X9YQFW32-0lw80wPDSW147ZGX3_9czHW45FPgv10B1WgW37Jcr94MT-r6W3WrcwG6j0vjHW1wxW-g3dgYBPf7kQj4W04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OjJhMzc6NzYxOTllZWNhMThkMGEzNDg2NmM0YWRhMjQ0MWM2Y2ZkMjhlMzY3NzkyOTY2NTcyZTRhZTA2YmQ4ODAxYzEzZDpoOlQ6Tg" target="_blank" rel="noopener" data-start="2706" data-end="2855" data-hs-link-id="0" data-hs-link-id-v2="AQ8NhPud"&gt;Read the coverage&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-start="2859" data-end="2916"&gt;&lt;SPAN&gt;Yann LeCun Leaves Meta to Pursue World Model Startup&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-start="2917" data-end="3346"&gt;&lt;SPAN&gt;Yann LeCun, Meta’s long time chief AI scientist, is reportedly leaving to launch a startup focused on world models, systems that build internal representations of their environment rather than rely solely on next token prediction. The move aligns with his belief that scaling language models alone cannot deliver the next major breakthroughs in AI.&lt;/SPAN&gt;&lt;BR data-start="3265" data-end="3268" /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwPT5nXHCW50kH_H6lZ3p8W3mJhd_8kB9DWW3PZXLn86qkZSN9kcy4LpVP2HW4F9sX069G_wMW2Tn8Qt4V1mtGMqvJqr75VbXW93nF3J2dR8N-W9fXnpt7_tjWjW3PMGQ74m8z0tW2qY-TF6zp3F2W4s1-ND1KRv4sW8QYCgy8v-bXnW8jYRCG30qGC3W198l_74185KsN3C0hSvBtMJZW2_CdH56Fl1JDVNKFjQ62t0p_W1dd98-6DZHRzW6T7nb04l5H9LV8Wfd84skxHmW61dW5B306KmgW8RF3FM2vxfXbW5T4bQ64sWn9KN81g1mq9qG6hW6yjlG79kcFrQW1kcDy97hwgP1W8ZfvYV898_MCW2MxXFD11NN4kW7bLzkT2xZCsMW2g976-7kzmx1VdQZg34tF1VFW8jCh7c61hymXf4rHdVq04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmRkYjA6ZGZmYTNlODE3ZWQ1MzhlZjU4ZDAxNTY2MDlmMWE5MjE4Y2UyYTJmZGM3OGRiZmY2NjkzYzg0NGFjNTA4YTAzNjpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwPT5nXHCW50kH_H6lZ3p8W3mJhd_8kB9DWW3PZXLn86qkZSN9kcy4LpVP2HW4F9sX069G_wMW2Tn8Qt4V1mtGMqvJqr75VbXW93nF3J2dR8N-W9fXnpt7_tjWjW3PMGQ74m8z0tW2qY-TF6zp3F2W4s1-ND1KRv4sW8QYCgy8v-bXnW8jYRCG30qGC3W198l_74185KsN3C0hSvBtMJZW2_CdH56Fl1JDVNKFjQ62t0p_W1dd98-6DZHRzW6T7nb04l5H9LV8Wfd84skxHmW61dW5B306KmgW8RF3FM2vxfXbW5T4bQ64sWn9KN81g1mq9qG6hW6yjlG79kcFrQW1kcDy97hwgP1W8ZfvYV898_MCW2MxXFD11NN4kW7bLzkT2xZCsMW2g976-7kzmx1VdQZg34tF1VFW8jCh7c61hymXf4rHdVq04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmRkYjA6ZGZmYTNlODE3ZWQ1MzhlZjU4ZDAxNTY2MDlmMWE5MjE4Y2UyYTJmZGM3OGRiZmY2NjkzYzg0NGFjNTA4YTAzNjpoOlQ6Tg" target="_new" rel="noopener" data-start="3271" data-end="3344" data-hs-link-id="0" data-hs-link-id-v2="kpOpdsWM"&gt;Read the report&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-start="3348" data-end="3376"&gt;&lt;SPAN&gt;OpenAI Releases GPT 5.1&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-start="3377" data-end="3794"&gt;&lt;SPAN&gt;OpenAI has shipped GPT 5.1 with variants such as Instant and Thinking, each designed to match the reasoning depth and latency required for a given task. The update brings faster responses, more consistent reasoning, and new controls for developers who want to tune how the model behaves across workflows.&lt;/SPAN&gt;&lt;BR data-start="3681" data-end="3684" /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwRF3qn9qW8wLKSR6lZ3ntW8FDNT9120RjXW2p_JL67wPJ_mW6lYGZ262sX-jW7y9D8T6mP4BVW4453pT42mf5wW5hlCZl7vL6LdW5mgLWV8Yg5cbW8QYh688vS4CtW4FPfNt2rzbcYVpWlP78dhSfWW5Y9Yc23lnDnCW3yhHyR6zv-RvW4H9vf55HBBhxW58rvFj49vnvkW1ps9hQ1bnvY8N1DRjdxP_D8fW3TgRcm6_tnRxW1kvk-n3V7QBcW825YfX7DSZDjW3QTmc7536h5cW2VFRtj48vnN2W3r3WJj6ng4R3W56CMSH8wk46KW647_pr1NMrxyW9fVkBk8QhXKBW7z_ZzY70xsrgW4vrLBt7zV6-jN4sYN1KvzBX0f7jmP5F04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmI0NmU6N2Q5Nzg3YzkyNzk4MTAzN2FiZTk2ZGNjYTVlOGI1ZjM3YjM4MzEzNWM2ZWMzMWFjZWQ2MGZlNDhiZTIwY2E3ZjpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwRF3qn9qW8wLKSR6lZ3ntW8FDNT9120RjXW2p_JL67wPJ_mW6lYGZ262sX-jW7y9D8T6mP4BVW4453pT42mf5wW5hlCZl7vL6LdW5mgLWV8Yg5cbW8QYh688vS4CtW4FPfNt2rzbcYVpWlP78dhSfWW5Y9Yc23lnDnCW3yhHyR6zv-RvW4H9vf55HBBhxW58rvFj49vnvkW1ps9hQ1bnvY8N1DRjdxP_D8fW3TgRcm6_tnRxW1kvk-n3V7QBcW825YfX7DSZDjW3QTmc7536h5cW2VFRtj48vnN2W3r3WJj6ng4R3W56CMSH8wk46KW647_pr1NMrxyW9fVkBk8QhXKBW7z_ZzY70xsrgW4vrLBt7zV6-jN4sYN1KvzBX0f7jmP5F04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmI0NmU6N2Q5Nzg3YzkyNzk4MTAzN2FiZTk2ZGNjYTVlOGI1ZjM3YjM4MzEzNWM2ZWMzMWFjZWQ2MGZlNDhiZTIwY2E3ZjpoOlQ6Tg" target="_blank" rel="noopener" data-start="3687" data-end="3792" data-hs-link-id="0" data-hs-link-id-v2="X0nB4DHU"&gt;Read the official announcement&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-start="3796" data-end="3845"&gt;&lt;STRONG&gt;In case you missed it, from the Lakera blog:&lt;/STRONG&gt;&lt;/P&gt;
&lt;H2 data-start="3847" data-end="3912"&gt;&lt;SPAN&gt;What the New MCP Specification Means to You, and Your Agents&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-start="3913" data-end="4345"&gt;&lt;SPAN&gt;This article walks through the evolution of the Model Context Protocol and explains how upcoming&amp;nbsp;features such as identity documents, authorization requirements, long running tasks, and registry based discovery will shape the safety of agentic systems. The piece is a practical guide for anyone building or securing agents.&lt;/SPAN&gt;&lt;BR data-start="4231" data-end="4234" /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwQs5nXHCW69t95C6lZ3lzW6x34P67HvCQKW2P_rKd4MGsQ5W8V7tVg1kY81WW566x3t8zMxmkN6ClfFv8TH_gW3NRGT-2-Z-51W16Y9Ll8McQypW1Byb831wwYDTW77GZCy4MsQvxW415FRx13qxb6W47GTff5F_22HW7Kmdt847v0hzW5fRtbM3RYp1tW6HhylH2KmyM8W5kgFQ443sP8wW3jCsDK6GvZNrW8rMFdw8mh7F6W2z-d132nVDgQW6hk7Tj8wBWg7W6fnQbD3TDLzZV5FwL-269mgpW39kxP62QGsmPW3ZTNtg4nhzl0N6D5PNKTyJttN7CKr7Vzx6hbW7k30PM3XHJjxW1kfl402lW_PqW4TWTM61kMWDfW2GwB5R5jjbVLW3sp0lG2bqk7QVD1Qn85PvlhdW7WMNWP1NVBN5VWt6vr5tHljFW54rlSP8d64LsW3bvvWJ1ZpgvgW71qyjP8M9WMkf39Rv-j04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmUwYTI6YzM0MGFkMGIyZGRiMTU4ZmI1ZmFhZjMxMTQ1MzAwMzE4MTI5ZjkxMDQ0NjJmNmYyYjg0OWM4OGQzNjM2YzNjMDpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwQs5nXHCW69t95C6lZ3lzW6x34P67HvCQKW2P_rKd4MGsQ5W8V7tVg1kY81WW566x3t8zMxmkN6ClfFv8TH_gW3NRGT-2-Z-51W16Y9Ll8McQypW1Byb831wwYDTW77GZCy4MsQvxW415FRx13qxb6W47GTff5F_22HW7Kmdt847v0hzW5fRtbM3RYp1tW6HhylH2KmyM8W5kgFQ443sP8wW3jCsDK6GvZNrW8rMFdw8mh7F6W2z-d132nVDgQW6hk7Tj8wBWg7W6fnQbD3TDLzZV5FwL-269mgpW39kxP62QGsmPW3ZTNtg4nhzl0N6D5PNKTyJttN7CKr7Vzx6hbW7k30PM3XHJjxW1kfl402lW_PqW4TWTM61kMWDfW2GwB5R5jjbVLW3sp0lG2bqk7QVD1Qn85PvlhdW7WMNWP1NVBN5VWt6vr5tHljFW54rlSP8d64LsW3bvvWJ1ZpgvgW71qyjP8M9WMkf39Rv-j04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmUwYTI6YzM0MGFkMGIyZGRiMTU4ZmI1ZmFhZjMxMTQ1MzAwMzE4MTI5ZjkxMDQ0NjJmNmYyYjg0OWM4OGQzNjM2YzNjMDpoOlQ6Tg" target="_new" rel="noopener" data-start="4237" data-end="4343" data-hs-link-id="0" data-hs-link-id-v2="SXE3ZUR+"&gt;Read the article&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-start="4347" data-end="4423"&gt;&lt;SPAN&gt;Indirect Prompt Injection, The Hidden Threat Breaking Modern AI Systems&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-start="4424" data-end="4868"&gt;&lt;SPAN&gt;Indirect prompt injection targets the data your AI ingests rather than the prompt itself, and it has become one of the most significant risks for systems that browse, retrieve, read documents, or call tools. This deep dive explains real incidents, why agentic AI amplifies the problem, and the architectural controls required to keep these attacks from escalating.&lt;/SPAN&gt;&lt;BR data-start="4788" data-end="4791" /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwRY3qn9qW95jsWP6lZ3mYW4NvHJG3WQ-2DW7HdJSJ6h-XjdN4pmsvwZbkfVW5JvLmH83-kVQW2q3XfL1YPvn4N53PxJKK1XGkV5d4pj4Mw3_MW8pCt8M5xZxvSN473JV66hlN6W58qQfR4xT7TvW1rDYtn6CwHNhN2HDfByj9jgRW3wYBS02zfGKsW7tV-cc2jt2dfW2D-yGV2w2gh9W94Ljfc9f_cssW5m_6Vk2PrJ1wW8nPWmX2Fg_ppVjNRDL2XhPVCVT9flZ7yqZM1W8PMF1z7fyPSVMttQKs8lLnmW4Bbvcn8QJnRnW1bqwkg13-l8zW9hcsxK3L8LTVW1C-PXy2yk8t2W3kSVPm5jrWM0W77MXtw51Rxh4W1c3NVK7rP-SgVt4Ltq2fvKx5f5s0WJl04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmYwNjQ6YWYyZTQ2YTM3ZTQ1NWM5MDU3ODY0NzQ0MjM0NGNjNjVhNmQ5OGUzOGEwZTA1ZTI2ZTA5NGM5NWI2NGEzMGNmMjpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwRY3qn9qW95jsWP6lZ3mYW4NvHJG3WQ-2DW7HdJSJ6h-XjdN4pmsvwZbkfVW5JvLmH83-kVQW2q3XfL1YPvn4N53PxJKK1XGkV5d4pj4Mw3_MW8pCt8M5xZxvSN473JV66hlN6W58qQfR4xT7TvW1rDYtn6CwHNhN2HDfByj9jgRW3wYBS02zfGKsW7tV-cc2jt2dfW2D-yGV2w2gh9W94Ljfc9f_cssW5m_6Vk2PrJ1wW8nPWmX2Fg_ppVjNRDL2XhPVCVT9flZ7yqZM1W8PMF1z7fyPSVMttQKs8lLnmW4Bbvcn8QJnRnW1bqwkg13-l8zW9hcsxK3L8LTVW1C-PXy2yk8t2W3kSVPm5jrWM0W77MXtw51Rxh4W1c3NVK7rP-SgVt4Ltq2fvKx5f5s0WJl04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmYwNjQ6YWYyZTQ2YTM3ZTQ1NWM5MDU3ODY0NzQ0MjM0NGNjNjVhNmQ5OGUzOGEwZTA1ZTI2ZTA5NGM5NWI2NGEzMGNmMjpoOlQ6Tg" target="_new" rel="noopener" data-start="4794" data-end="4866" data-hs-link-id="0" data-hs-link-id-v2="fAXJKMMm"&gt;Read the article&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-start="4424" data-end="4868"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="4424" data-end="4868"&gt;&lt;SPAN&gt;From exploited clusters to new open models and evolving protocol standards, the theme this week is clear. AI systems are becoming core infrastructure, and the safety of that infrastructure will determine how quickly organizations can deploy more advanced capabilities.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 24 Nov 2025 12:03:37 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2025-11-24T12:03:37Z</dc:date>
    <item>
      <title>Lakera bulletin - This week in AI - Nov 24, 2025</title>
      <link>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-bulletin-This-week-in-AI-Nov-24-2025/m-p/263542#M30</link>
      <description>&lt;P&gt;&lt;SPAN&gt;It has been a week of big moves across the AI stack, from real attacks on ML infrastructure to new open models and fresh frontier releases. We also saw protocol updates that will shape how agents operate, plus shifts in public-sector AI and leadership changes at the top of the research world. &lt;/SPAN&gt;&lt;SPAN&gt;There is a lot happening at once, and much of it sits right at the intersection of capability and security.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-start="781" data-end="801"&gt;&lt;SPAN&gt;Let’s get into it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-start="803" data-end="864"&gt;&lt;SPAN&gt;Ray Framework Exploited in Global Cryptojacking Campaign&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-start="865" data-end="1351"&gt;&lt;SPAN&gt;A two year old vulnerability in the Ray AI framework is being actively exploited in a campaign that hijacks exposed clusters for cryptomining and botnet operations. The activity highlights how quickly attackers move when machine learning infrastructure is deployed without authentication, proper access controls, or basic exposure checks.&lt;/SPAN&gt;&lt;BR data-start="1203" data-end="1206" /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwQs5nXHCW69t95C6lZ3q6W6QNY5G6GrypmW7jGCkr6MM9PLV70lxy10gSB6W7zn1-W8MrDsHW4rk2WJ57LT40W7-DbV_8bG0nCW7q2hRM48rBr-W8j6tbT4Gms4yW1jsvvp4-BzRhW24BTDG8phwQqW4gcSJD4kkkzNW6wyWZ41R4dX8W64-tgs35LLNJW68PD1T5zHbMBN5SfwvxctY52W1rtXTN8f0qDMW5M9zCn1-ybYbW1j9Z9Z59mkMQW8FqrVZ30FT04W6F2pBX1HCjGZW8rx9nW1GRMSMW39V2ZP67WbP5V4xXGg7FcnFvW4jRNFy7j1Y6JW4cbK8D3XBHMfW3zmWwJ1htmJbW7RCzrp5KnqKmW8BTFVb6cX4F7N2MXLlpD2fKwW2qJ09P3rD243VbWbT-4-ySlbMYWhS_zVCZTW3SDxyj7Pdd7fVXNjBH3mnFyWW1gzCMx6Ym6dBW8HJ-mg6t0W-Pf7XDDc204___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OjdlMmY6ZjVmODQwOTkxOTE5NzJhYWM3ZmNhNzEzYTM1Zjg5ZDFiYjY4M2RiN2E5OTg0MDNmMzYyNTgyMzkxMDdhOWU1OTpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwQs5nXHCW69t95C6lZ3q6W6QNY5G6GrypmW7jGCkr6MM9PLV70lxy10gSB6W7zn1-W8MrDsHW4rk2WJ57LT40W7-DbV_8bG0nCW7q2hRM48rBr-W8j6tbT4Gms4yW1jsvvp4-BzRhW24BTDG8phwQqW4gcSJD4kkkzNW6wyWZ41R4dX8W64-tgs35LLNJW68PD1T5zHbMBN5SfwvxctY52W1rtXTN8f0qDMW5M9zCn1-ybYbW1j9Z9Z59mkMQW8FqrVZ30FT04W6F2pBX1HCjGZW8rx9nW1GRMSMW39V2ZP67WbP5V4xXGg7FcnFvW4jRNFy7j1Y6JW4cbK8D3XBHMfW3zmWwJ1htmJbW7RCzrp5KnqKmW8BTFVb6cX4F7N2MXLlpD2fKwW2qJ09P3rD243VbWbT-4-ySlbMYWhS_zVCZTW3SDxyj7Pdd7fVXNjBH3mnFyWW1gzCMx6Ym6dBW8HJ-mg6t0W-Pf7XDDc204___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OjdlMmY6ZjVmODQwOTkxOTE5NzJhYWM3ZmNhNzEzYTM1Zjg5ZDFiYjY4M2RiN2E5OTg0MDNmMzYyNTgyMzkxMDdhOWU1OTpoOlQ6Tg" target="_blank" rel="noopener" data-start="1209" data-end="1349" data-hs-link-id="0" data-hs-link-id-v2="KfIvcnC7"&gt;Read the full story&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-start="1353" data-end="1415"&gt;&lt;SPAN&gt;Allen Institute for AI Releases Olmo 3 Open Weight Models&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-start="1416" data-end="1763"&gt;&lt;SPAN&gt;The Allen Institute for AI has introduced Olmo 3, a new open weight model family designed to offer strong performance and full transparency for researchers and developers. The release expands the set of models that teams can inspect, customize, and self host without license friction.&lt;/SPAN&gt;&lt;BR data-start="1700" data-end="1703" /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwRF3qn9qW8wLKSR6lZ3nPW2T4cxr5RzgdqN3DLcXltP32MW9f_Q2n2B_DZsW8yvV1T2NYVTdW5TB3DX9fcLH2W77SH6X79jt9WW8-wFyc5HHwh3W5g0lnD7VG-tsW98qPft13pTYTW4mcD9p3sLwglW6VRgN58YzmwGW35YD2T1nT31DW7C8rHm1XkVqQW44z6gj61WQV3W3_XZzj5sBxlYW84cT3Q3fJRv6VFRw5z6Pbd1pW2B0mz83qhYJNW6z4QDv8FjwBMW24zrr37yN5zSW4GplVS27d375W9dpZGT8NjlHnW2hR_83891wCsW3S2_rP1p6DJVW6zwSDH8Zz7-fW5hhcjz34Gcg7W5l616t7Q-ZZVV5Y7k73cQq6Df35S3F004___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmEyMmE6NGExZWI4YmRjZjVhZGNlNWNjYjc2Mjg4NzI4ZmY0ZDQ3ZmRkNGU4OWI3NTkzODJkY2U0Mzc1OTg5YjViNGRmYjpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwRF3qn9qW8wLKSR6lZ3nPW2T4cxr5RzgdqN3DLcXltP32MW9f_Q2n2B_DZsW8yvV1T2NYVTdW5TB3DX9fcLH2W77SH6X79jt9WW8-wFyc5HHwh3W5g0lnD7VG-tsW98qPft13pTYTW4mcD9p3sLwglW6VRgN58YzmwGW35YD2T1nT31DW7C8rHm1XkVqQW44z6gj61WQV3W3_XZzj5sBxlYW84cT3Q3fJRv6VFRw5z6Pbd1pW2B0mz83qhYJNW6z4QDv8FjwBMW24zrr37yN5zSW4GplVS27d375W9dpZGT8NjlHnW2hR_83891wCsW3S2_rP1p6DJVW6zwSDH8Zz7-fW5hhcjz34Gcg7W5l616t7Q-ZZVV5Y7k73cQq6Df35S3F004___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmEyMmE6NGExZWI4YmRjZjVhZGNlNWNjYjc2Mjg4NzI4ZmY0ZDQ3ZmRkNGU4OWI3NTkzODJkY2U0Mzc1OTg5YjViNGRmYjpoOlQ6Tg" target="_new" rel="noopener" data-start="1706" data-end="1761" data-hs-link-id="0" data-hs-link-id-v2="dIpvkPHf"&gt;Read the announcement&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-start="1765" data-end="1794"&gt;&lt;SPAN&gt;Google Launches Gemini 3&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-start="1795" data-end="2239"&gt;&lt;SPAN&gt;Google has released Gemini 3 with improved multimodal reasoning, a new Deep Think mode, and tighter integration into Google's apps and services. As frontier models continue to embed themselves into enterprise and consumer workflows, security teams will need to monitor the growing number of pathways these systems use to access data and tools.&lt;/SPAN&gt;&lt;BR data-start="2138" data-end="2141" /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwRY3qn9qW95jsWP6lZ3lPW2YT3L64W2QKTN5CRByP89dW4W8Vmmzh3P27mZW36kPY_7BcyMsW46KJn36QW0gmVwvb6m7Z0BV4W1q8MjK3mykSsW6dFkL-3Z5x2dW5JZFKw6LBDWtV9DLrr5xYghBW4sqd7x6g4p-KN7cpz6Kt3HpHW6v6Kf52dQ31GW7P3Jqz8CpsqBW7Q8vsV8vSW68W3fDDGm7XNp1PW8dd8bb3X_CM9W6kcCFR3rQ3V1W2dKMRM2-bRLXW7zHkd_6H4fgbW7ZnzVK7XQqYDW78r_LW5vCdLSVJbwKw41b3znW4hmsXx3Wp3-2W7jz_8x6W752hW9cCjjM7zNfh2W8tp2tT68Lxk3VxZQQ394TzngW4zS22b5Qq88vW4BMv4f5g4d4Qf3Js1Pj04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmJkMDg6YzZhN2IwN2E3MjU3OWZlNDM1MTIyYzI2ZjIwNGFmNzFkN2I4YTI3MWNlMGZlNzA2YjBkY2RlODZmMDZkNjRlYzpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwRY3qn9qW95jsWP6lZ3lPW2YT3L64W2QKTN5CRByP89dW4W8Vmmzh3P27mZW36kPY_7BcyMsW46KJn36QW0gmVwvb6m7Z0BV4W1q8MjK3mykSsW6dFkL-3Z5x2dW5JZFKw6LBDWtV9DLrr5xYghBW4sqd7x6g4p-KN7cpz6Kt3HpHW6v6Kf52dQ31GW7P3Jqz8CpsqBW7Q8vsV8vSW68W3fDDGm7XNp1PW8dd8bb3X_CM9W6kcCFR3rQ3V1W2dKMRM2-bRLXW7zHkd_6H4fgbW7ZnzVK7XQqYDW78r_LW5vCdLSVJbwKw41b3znW4hmsXx3Wp3-2W7jz_8x6W752hW9cCjjM7zNfh2W8tp2tT68Lxk3VxZQQ394TzngW4zS22b5Qq88vW4BMv4f5g4d4Qf3Js1Pj04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmJkMDg6YzZhN2IwN2E3MjU3OWZlNDM1MTIyYzI2ZjIwNGFmNzFkN2I4YTI3MWNlMGZlNzA2YjBkY2RlODZmMDZkNjRlYzpoOlQ6Tg" target="_blank" rel="noopener" data-start="2144" data-end="2237" data-hs-link-id="0" data-hs-link-id-v2="pPhoBD0j"&gt;Read the announcement&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-start="2241" data-end="2294"&gt;&lt;SPAN&gt;Sweden Suspends Biased ML Fraud Detection System&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-start="2295" data-end="2857"&gt;&lt;SPAN&gt;Sweden’s social insurance agency has suspended an AI system used to flag potential benefit fraud after an investigation found that the model disproportionately targeted women, immigrants, and lower income groups. The decision underscores how quickly automated decisions can shape public policy, and why continuous evaluation and transparency are essential when governments deploy machine learning systems.&lt;/SPAN&gt;&lt;BR data-start="2700" data-end="2703" /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwQM5nXHCW6N1X8z6lZ3nvW3DV4M97mnLpNW7XCGyr3nbH49W3yXWvk8njB9vVZvX7n4XfDBfW4_-t0k1r-ZRfW4vSWqD50DpbkW792GcM5GNkj4W6GxmJ04N0vmcV651S06f8lfjW7lh1M25yN9tpW7DwbTm2tTtxWW7xLzvk4xjrJgN30_bjrRz5lHN8f0r78CFfJKW6c8ldr7Fb_yvW257jLD2P-TFnW2Tl-Wr8Z9wJ5W31DjkW670GNfMz_PM12ysRhW8sCfww1WTxPsW9gHkMg3gm1mNVQxPfJ12qJC0W43zcxV2dj731W4HCRML8TNhM3W7zyWdr5BFPs9W5F8t6S2hZzvbW5TpdT55lRPw1N1zVCJtHR26dW7wnLHv6QBs3vW7PsHfS1P1v5qW28PZdg2VLyWPW3MzCMj1X9YQFW32-0lw80wPDSW147ZGX3_9czHW45FPgv10B1WgW37Jcr94MT-r6W3WrcwG6j0vjHW1wxW-g3dgYBPf7kQj4W04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OjJhMzc6NzYxOTllZWNhMThkMGEzNDg2NmM0YWRhMjQ0MWM2Y2ZkMjhlMzY3NzkyOTY2NTcyZTRhZTA2YmQ4ODAxYzEzZDpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwQM5nXHCW6N1X8z6lZ3nvW3DV4M97mnLpNW7XCGyr3nbH49W3yXWvk8njB9vVZvX7n4XfDBfW4_-t0k1r-ZRfW4vSWqD50DpbkW792GcM5GNkj4W6GxmJ04N0vmcV651S06f8lfjW7lh1M25yN9tpW7DwbTm2tTtxWW7xLzvk4xjrJgN30_bjrRz5lHN8f0r78CFfJKW6c8ldr7Fb_yvW257jLD2P-TFnW2Tl-Wr8Z9wJ5W31DjkW670GNfMz_PM12ysRhW8sCfww1WTxPsW9gHkMg3gm1mNVQxPfJ12qJC0W43zcxV2dj731W4HCRML8TNhM3W7zyWdr5BFPs9W5F8t6S2hZzvbW5TpdT55lRPw1N1zVCJtHR26dW7wnLHv6QBs3vW7PsHfS1P1v5qW28PZdg2VLyWPW3MzCMj1X9YQFW32-0lw80wPDSW147ZGX3_9czHW45FPgv10B1WgW37Jcr94MT-r6W3WrcwG6j0vjHW1wxW-g3dgYBPf7kQj4W04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OjJhMzc6NzYxOTllZWNhMThkMGEzNDg2NmM0YWRhMjQ0MWM2Y2ZkMjhlMzY3NzkyOTY2NTcyZTRhZTA2YmQ4ODAxYzEzZDpoOlQ6Tg" target="_blank" rel="noopener" data-start="2706" data-end="2855" data-hs-link-id="0" data-hs-link-id-v2="AQ8NhPud"&gt;Read the coverage&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-start="2859" data-end="2916"&gt;&lt;SPAN&gt;Yann LeCun Leaves Meta to Pursue World Model Startup&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-start="2917" data-end="3346"&gt;&lt;SPAN&gt;Yann LeCun, Meta’s long time chief AI scientist, is reportedly leaving to launch a startup focused on world models, systems that build internal representations of their environment rather than rely solely on next token prediction. The move aligns with his belief that scaling language models alone cannot deliver the next major breakthroughs in AI.&lt;/SPAN&gt;&lt;BR data-start="3265" data-end="3268" /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwPT5nXHCW50kH_H6lZ3p8W3mJhd_8kB9DWW3PZXLn86qkZSN9kcy4LpVP2HW4F9sX069G_wMW2Tn8Qt4V1mtGMqvJqr75VbXW93nF3J2dR8N-W9fXnpt7_tjWjW3PMGQ74m8z0tW2qY-TF6zp3F2W4s1-ND1KRv4sW8QYCgy8v-bXnW8jYRCG30qGC3W198l_74185KsN3C0hSvBtMJZW2_CdH56Fl1JDVNKFjQ62t0p_W1dd98-6DZHRzW6T7nb04l5H9LV8Wfd84skxHmW61dW5B306KmgW8RF3FM2vxfXbW5T4bQ64sWn9KN81g1mq9qG6hW6yjlG79kcFrQW1kcDy97hwgP1W8ZfvYV898_MCW2MxXFD11NN4kW7bLzkT2xZCsMW2g976-7kzmx1VdQZg34tF1VFW8jCh7c61hymXf4rHdVq04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmRkYjA6ZGZmYTNlODE3ZWQ1MzhlZjU4ZDAxNTY2MDlmMWE5MjE4Y2UyYTJmZGM3OGRiZmY2NjkzYzg0NGFjNTA4YTAzNjpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwPT5nXHCW50kH_H6lZ3p8W3mJhd_8kB9DWW3PZXLn86qkZSN9kcy4LpVP2HW4F9sX069G_wMW2Tn8Qt4V1mtGMqvJqr75VbXW93nF3J2dR8N-W9fXnpt7_tjWjW3PMGQ74m8z0tW2qY-TF6zp3F2W4s1-ND1KRv4sW8QYCgy8v-bXnW8jYRCG30qGC3W198l_74185KsN3C0hSvBtMJZW2_CdH56Fl1JDVNKFjQ62t0p_W1dd98-6DZHRzW6T7nb04l5H9LV8Wfd84skxHmW61dW5B306KmgW8RF3FM2vxfXbW5T4bQ64sWn9KN81g1mq9qG6hW6yjlG79kcFrQW1kcDy97hwgP1W8ZfvYV898_MCW2MxXFD11NN4kW7bLzkT2xZCsMW2g976-7kzmx1VdQZg34tF1VFW8jCh7c61hymXf4rHdVq04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmRkYjA6ZGZmYTNlODE3ZWQ1MzhlZjU4ZDAxNTY2MDlmMWE5MjE4Y2UyYTJmZGM3OGRiZmY2NjkzYzg0NGFjNTA4YTAzNjpoOlQ6Tg" target="_new" rel="noopener" data-start="3271" data-end="3344" data-hs-link-id="0" data-hs-link-id-v2="kpOpdsWM"&gt;Read the report&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-start="3348" data-end="3376"&gt;&lt;SPAN&gt;OpenAI Releases GPT 5.1&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-start="3377" data-end="3794"&gt;&lt;SPAN&gt;OpenAI has shipped GPT 5.1 with variants such as Instant and Thinking, each designed to match the reasoning depth and latency required for a given task. The update brings faster responses, more consistent reasoning, and new controls for developers who want to tune how the model behaves across workflows.&lt;/SPAN&gt;&lt;BR data-start="3681" data-end="3684" /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwRF3qn9qW8wLKSR6lZ3ntW8FDNT9120RjXW2p_JL67wPJ_mW6lYGZ262sX-jW7y9D8T6mP4BVW4453pT42mf5wW5hlCZl7vL6LdW5mgLWV8Yg5cbW8QYh688vS4CtW4FPfNt2rzbcYVpWlP78dhSfWW5Y9Yc23lnDnCW3yhHyR6zv-RvW4H9vf55HBBhxW58rvFj49vnvkW1ps9hQ1bnvY8N1DRjdxP_D8fW3TgRcm6_tnRxW1kvk-n3V7QBcW825YfX7DSZDjW3QTmc7536h5cW2VFRtj48vnN2W3r3WJj6ng4R3W56CMSH8wk46KW647_pr1NMrxyW9fVkBk8QhXKBW7z_ZzY70xsrgW4vrLBt7zV6-jN4sYN1KvzBX0f7jmP5F04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmI0NmU6N2Q5Nzg3YzkyNzk4MTAzN2FiZTk2ZGNjYTVlOGI1ZjM3YjM4MzEzNWM2ZWMzMWFjZWQ2MGZlNDhiZTIwY2E3ZjpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwRF3qn9qW8wLKSR6lZ3ntW8FDNT9120RjXW2p_JL67wPJ_mW6lYGZ262sX-jW7y9D8T6mP4BVW4453pT42mf5wW5hlCZl7vL6LdW5mgLWV8Yg5cbW8QYh688vS4CtW4FPfNt2rzbcYVpWlP78dhSfWW5Y9Yc23lnDnCW3yhHyR6zv-RvW4H9vf55HBBhxW58rvFj49vnvkW1ps9hQ1bnvY8N1DRjdxP_D8fW3TgRcm6_tnRxW1kvk-n3V7QBcW825YfX7DSZDjW3QTmc7536h5cW2VFRtj48vnN2W3r3WJj6ng4R3W56CMSH8wk46KW647_pr1NMrxyW9fVkBk8QhXKBW7z_ZzY70xsrgW4vrLBt7zV6-jN4sYN1KvzBX0f7jmP5F04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmI0NmU6N2Q5Nzg3YzkyNzk4MTAzN2FiZTk2ZGNjYTVlOGI1ZjM3YjM4MzEzNWM2ZWMzMWFjZWQ2MGZlNDhiZTIwY2E3ZjpoOlQ6Tg" target="_blank" rel="noopener" data-start="3687" data-end="3792" data-hs-link-id="0" data-hs-link-id-v2="X0nB4DHU"&gt;Read the official announcement&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-start="3796" data-end="3845"&gt;&lt;STRONG&gt;In case you missed it, from the Lakera blog:&lt;/STRONG&gt;&lt;/P&gt;
&lt;H2 data-start="3847" data-end="3912"&gt;&lt;SPAN&gt;What the New MCP Specification Means to You, and Your Agents&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-start="3913" data-end="4345"&gt;&lt;SPAN&gt;This article walks through the evolution of the Model Context Protocol and explains how upcoming&amp;nbsp;features such as identity documents, authorization requirements, long running tasks, and registry based discovery will shape the safety of agentic systems. The piece is a practical guide for anyone building or securing agents.&lt;/SPAN&gt;&lt;BR data-start="4231" data-end="4234" /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwQs5nXHCW69t95C6lZ3lzW6x34P67HvCQKW2P_rKd4MGsQ5W8V7tVg1kY81WW566x3t8zMxmkN6ClfFv8TH_gW3NRGT-2-Z-51W16Y9Ll8McQypW1Byb831wwYDTW77GZCy4MsQvxW415FRx13qxb6W47GTff5F_22HW7Kmdt847v0hzW5fRtbM3RYp1tW6HhylH2KmyM8W5kgFQ443sP8wW3jCsDK6GvZNrW8rMFdw8mh7F6W2z-d132nVDgQW6hk7Tj8wBWg7W6fnQbD3TDLzZV5FwL-269mgpW39kxP62QGsmPW3ZTNtg4nhzl0N6D5PNKTyJttN7CKr7Vzx6hbW7k30PM3XHJjxW1kfl402lW_PqW4TWTM61kMWDfW2GwB5R5jjbVLW3sp0lG2bqk7QVD1Qn85PvlhdW7WMNWP1NVBN5VWt6vr5tHljFW54rlSP8d64LsW3bvvWJ1ZpgvgW71qyjP8M9WMkf39Rv-j04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmUwYTI6YzM0MGFkMGIyZGRiMTU4ZmI1ZmFhZjMxMTQ1MzAwMzE4MTI5ZjkxMDQ0NjJmNmYyYjg0OWM4OGQzNjM2YzNjMDpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwQs5nXHCW69t95C6lZ3lzW6x34P67HvCQKW2P_rKd4MGsQ5W8V7tVg1kY81WW566x3t8zMxmkN6ClfFv8TH_gW3NRGT-2-Z-51W16Y9Ll8McQypW1Byb831wwYDTW77GZCy4MsQvxW415FRx13qxb6W47GTff5F_22HW7Kmdt847v0hzW5fRtbM3RYp1tW6HhylH2KmyM8W5kgFQ443sP8wW3jCsDK6GvZNrW8rMFdw8mh7F6W2z-d132nVDgQW6hk7Tj8wBWg7W6fnQbD3TDLzZV5FwL-269mgpW39kxP62QGsmPW3ZTNtg4nhzl0N6D5PNKTyJttN7CKr7Vzx6hbW7k30PM3XHJjxW1kfl402lW_PqW4TWTM61kMWDfW2GwB5R5jjbVLW3sp0lG2bqk7QVD1Qn85PvlhdW7WMNWP1NVBN5VWt6vr5tHljFW54rlSP8d64LsW3bvvWJ1ZpgvgW71qyjP8M9WMkf39Rv-j04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmUwYTI6YzM0MGFkMGIyZGRiMTU4ZmI1ZmFhZjMxMTQ1MzAwMzE4MTI5ZjkxMDQ0NjJmNmYyYjg0OWM4OGQzNjM2YzNjMDpoOlQ6Tg" target="_new" rel="noopener" data-start="4237" data-end="4343" data-hs-link-id="0" data-hs-link-id-v2="SXE3ZUR+"&gt;Read the article&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-start="4347" data-end="4423"&gt;&lt;SPAN&gt;Indirect Prompt Injection, The Hidden Threat Breaking Modern AI Systems&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-start="4424" data-end="4868"&gt;&lt;SPAN&gt;Indirect prompt injection targets the data your AI ingests rather than the prompt itself, and it has become one of the most significant risks for systems that browse, retrieve, read documents, or call tools. This deep dive explains real incidents, why agentic AI amplifies the problem, and the architectural controls required to keep these attacks from escalating.&lt;/SPAN&gt;&lt;BR data-start="4788" data-end="4791" /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwRY3qn9qW95jsWP6lZ3mYW4NvHJG3WQ-2DW7HdJSJ6h-XjdN4pmsvwZbkfVW5JvLmH83-kVQW2q3XfL1YPvn4N53PxJKK1XGkV5d4pj4Mw3_MW8pCt8M5xZxvSN473JV66hlN6W58qQfR4xT7TvW1rDYtn6CwHNhN2HDfByj9jgRW3wYBS02zfGKsW7tV-cc2jt2dfW2D-yGV2w2gh9W94Ljfc9f_cssW5m_6Vk2PrJ1wW8nPWmX2Fg_ppVjNRDL2XhPVCVT9flZ7yqZM1W8PMF1z7fyPSVMttQKs8lLnmW4Bbvcn8QJnRnW1bqwkg13-l8zW9hcsxK3L8LTVW1C-PXy2yk8t2W3kSVPm5jrWM0W77MXtw51Rxh4W1c3NVK7rP-SgVt4Ltq2fvKx5f5s0WJl04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmYwNjQ6YWYyZTQ2YTM3ZTQ1NWM5MDU3ODY0NzQ0MjM0NGNjNjVhNmQ5OGUzOGEwZTA1ZTI2ZTA5NGM5NWI2NGEzMGNmMjpoOlQ6Tg" contenteditable="false" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VWzHyT1T0qRTW18Ddqx3YL7fbW2C4PM95G8H9LM3ZwRY3qn9qW95jsWP6lZ3mYW4NvHJG3WQ-2DW7HdJSJ6h-XjdN4pmsvwZbkfVW5JvLmH83-kVQW2q3XfL1YPvn4N53PxJKK1XGkV5d4pj4Mw3_MW8pCt8M5xZxvSN473JV66hlN6W58qQfR4xT7TvW1rDYtn6CwHNhN2HDfByj9jgRW3wYBS02zfGKsW7tV-cc2jt2dfW2D-yGV2w2gh9W94Ljfc9f_cssW5m_6Vk2PrJ1wW8nPWmX2Fg_ppVjNRDL2XhPVCVT9flZ7yqZM1W8PMF1z7fyPSVMttQKs8lLnmW4Bbvcn8QJnRnW1bqwkg13-l8zW9hcsxK3L8LTVW1C-PXy2yk8t2W3kSVPm5jrWM0W77MXtw51Rxh4W1c3NVK7rP-SgVt4Ltq2fvKx5f5s0WJl04___.YzJlOmNwYWxsOmM6bzoxNWUxODI2NTNkNjc0NDc2MzMwZjViMGNkNmU4ZjIyOTo3OmYwNjQ6YWYyZTQ2YTM3ZTQ1NWM5MDU3ODY0NzQ0MjM0NGNjNjVhNmQ5OGUzOGEwZTA1ZTI2ZTA5NGM5NWI2NGEzMGNmMjpoOlQ6Tg" target="_new" rel="noopener" data-start="4794" data-end="4866" data-hs-link-id="0" data-hs-link-id-v2="fAXJKMMm"&gt;Read the article&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-start="4424" data-end="4868"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="4424" data-end="4868"&gt;&lt;SPAN&gt;From exploited clusters to new open models and evolving protocol standards, the theme this week is clear. AI systems are becoming core infrastructure, and the safety of that infrastructure will determine how quickly organizations can deploy more advanced capabilities.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Nov 2025 12:03:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-bulletin-This-week-in-AI-Nov-24-2025/m-p/263542#M30</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-11-24T12:03:37Z</dc:date>
    </item>
  </channel>
</rss>

