<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Lakera Bulletin - This Week in AI: Cyber Models, Prompt Injection, and Agentic AI Gone Wrong in AI Agents Security</title>
    <link>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-Bulletin-This-Week-in-AI-Cyber-Models-Prompt-Injection/m-p/276404#M95</link>
    <description>&lt;P data-end="329" data-start="13"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;AI security took center stage this week:&amp;nbsp;from cyber-only frontier models and fast-moving infrastructure flaws, to prompt injections surfacing across the public web. We also saw a real-world reminder of what can happen when coding agents get production access, plus new multimodal releases from SenseTime and Google.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-end="349" data-start="331"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;Let’s get into it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-end="387" data-start="351" data-section-id="cuzpxd"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;OpenAI Plans a Cyber-Only Model&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-end="813" data-start="388"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;OpenAI is preparing GPT-5.5-Cyber, a cybersecurity-focused model reportedly limited to vetted “critical cyber defenders” at launch. The move reflects a growing shift toward restricted access for highly capable cyber AI tools,&amp;nbsp;useful for defenders, but risky in the wrong hands.&lt;/SPAN&gt;&lt;BR data-end="669" data-start="666" /&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgT5nXHCW7lCGcx6lZ3mzW4FFyrP6h_c0vW95yjvs4LlY3jW28Zslv3qfsl9W3JGs1Z8_NpS3W10kBF34mnYGfW16tz7X6q8KySN6CKlG2ZJDf6W1jNrWv4L60FHW7H_6s-3RS-K-W2jqB3z7RplJyN5s_P1QfP30JVjBMHt35bjktW2gMDKS5xBZLnW3BlnwV5tJn9bW7NgL017yWnL8W6VLR4N5X6-zsN5x1wXMThPQqW3hwwTN4yfHK0N5pyDgHrTKV7W4BLtLc3rQz6kN4pBqTg1lSXFN637-5C7y1rKW6DD2Ws7HfSPZV9KhZy7-LG0VW3pVyLn7JY9-lVv-Wgc44Z7HqW5Dv1z76Bcv_TW8bKvnl6wr1hVW8_Kr5V5FTj_1W1xKFHk6knxgWW7mBTjc11HbVCW7XglCP44Dnb5N10Jtsp9GQG_W74wQ6H2jXd5wW5VKxcR5V7vyZW6z9QKc1YRRNHW4S1Vrz9hqZWkW7vlHyb1nJdqLV6jMp44NGqZ7W96qnFM7HJC5_f2Rh4Sb04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OjhkOTY6ZDQwN2MzMzlhNzM4MjgyOWEwZjg1YzZhNWNlMDQ2OGE5ZmQyNTgxYTZjNmJiZGVmZjY5YzM3NTE2ZGMxZDFhZjpoOlQ6Tg" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgT5nXHCW7lCGcx6lZ3mzW4FFyrP6h_c0vW95yjvs4LlY3jW28Zslv3qfsl9W3JGs1Z8_NpS3W10kBF34mnYGfW16tz7X6q8KySN6CKlG2ZJDf6W1jNrWv4L60FHW7H_6s-3RS-K-W2jqB3z7RplJyN5s_P1QfP30JVjBMHt35bjktW2gMDKS5xBZLnW3BlnwV5tJn9bW7NgL017yWnL8W6VLR4N5X6-zsN5x1wXMThPQqW3hwwTN4yfHK0N5pyDgHrTKV7W4BLtLc3rQz6kN4pBqTg1lSXFN637-5C7y1rKW6DD2Ws7HfSPZV9KhZy7-LG0VW3pVyLn7JY9-lVv-Wgc44Z7HqW5Dv1z76Bcv_TW8bKvnl6wr1hVW8_Kr5V5FTj_1W1xKFHk6knxgWW7mBTjc11HbVCW7XglCP44Dnb5N10Jtsp9GQG_W74wQ6H2jXd5wW5VKxcR5V7vyZW6z9QKc1YRRNHW4S1Vrz9hqZWkW7vlHyb1nJdqLV6jMp44NGqZ7W96qnFM7HJC5_f2Rh4Sb04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OjhkOTY6ZDQwN2MzMzlhNzM4MjgyOWEwZjg1YzZhNWNlMDQ2OGE5ZmQyNTgxYTZjNmJiZGVmZjY5YzM3NTE2ZGMxZDFhZjpoOlQ6Tg" rel="noopener" data-outlook-id="895830b4-1265-4d96-b09d-ed2747f0ef96" data-hs-link-id-v2="0XhdzKcW" data-hs-link-id="0" target="_blank"&gt;Read The Verge coverage&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-end="865" data-start="815" data-section-id="sfo4i1"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;LiteLLM Discloses Critical SQL Injection Flaw&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-end="1284" data-start="866"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;LiteLLM published a security update for CVE-2026-42208, a SQL injection vulnerability in its proxy’s API key verification path. For teams routing model calls through AI gateways, it’s a reminder that LLM infrastructure is now critical infrastructure,&amp;nbsp;and needs the same urgency as any exposed auth layer.&lt;/SPAN&gt;&lt;BR data-end="1174" data-start="1171" /&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgg5nXHCW69t95C6lZ3q7W5D3Bxv78SxpKW4rFvj798fCN1W549VYL22j4zGW1hkr-97fNnnwW5WrS2B2d_hhQW20Hf2Z2CVY8JW2F99Tx1gyhP0W6jpxM17C1NHPW6_l5gk7PlfQjVTgkPL49ZTRQW80M-b_4cSfGNMqHdvGSrFYpW4HxWqy3CxQ4wW2xHB_L71MGCsW8d0XTr5t6X3xW3FsLyF3lcdDKW92skM313V0QzW7MRM001s5w0PW8TNvkn3SwjjlW3-n1mr97VGKGW8qDz3W5hzzs4W5HJ4QM1kQR2TV9By2f7DvCP6W9k39vx6sB6l-N95_0xzXLktVW6vWGPR2qRFfpW4NqNLj130HsdW5YFRm_72Mjk4W1K7Q7n4ch_NlW4sMX3n23fwcdW2GDPL45z5rPRW8wfpN74swDVqW3ZwYYr2t2Dm8W3xMFSg8p17lMW618G_046CVxSW68pM0p1jqsq4f1zkMz-04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OmQxZGM6YWY1Y2RlMmNlZmZiNGRjOWVjZGU0NjJmNzdhNjk3YmY0OTQ0NGE2NjEyODg5MWVlYWFiNmFhODgzZjM5M2UxZDpoOlQ6Tg" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgg5nXHCW69t95C6lZ3q7W5D3Bxv78SxpKW4rFvj798fCN1W549VYL22j4zGW1hkr-97fNnnwW5WrS2B2d_hhQW20Hf2Z2CVY8JW2F99Tx1gyhP0W6jpxM17C1NHPW6_l5gk7PlfQjVTgkPL49ZTRQW80M-b_4cSfGNMqHdvGSrFYpW4HxWqy3CxQ4wW2xHB_L71MGCsW8d0XTr5t6X3xW3FsLyF3lcdDKW92skM313V0QzW7MRM001s5w0PW8TNvkn3SwjjlW3-n1mr97VGKGW8qDz3W5hzzs4W5HJ4QM1kQR2TV9By2f7DvCP6W9k39vx6sB6l-N95_0xzXLktVW6vWGPR2qRFfpW4NqNLj130HsdW5YFRm_72Mjk4W1K7Q7n4ch_NlW4sMX3n23fwcdW2GDPL45z5rPRW8wfpN74swDVqW3ZwYYr2t2Dm8W3xMFSg8p17lMW618G_046CVxSW68pM0p1jqsq4f1zkMz-04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OmQxZGM6YWY1Y2RlMmNlZmZiNGRjOWVjZGU0NjJmNzdhNjk3YmY0OTQ0NGE2NjEyODg5MWVlYWFiNmFhODgzZjM5M2UxZDpoOlQ6Tg" rel="noopener" data-outlook-id="2d8f50b0-56aa-4504-a404-865a644ee492" data-hs-link-id-v2="orzqfjbR" data-hs-link-id="0" target="_blank"&gt;Read the LiteLLM security update&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-end="1336" data-start="1286" data-section-id="pxlk2i"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;Hugging Face LeRobot Hit by RCE Vulnerability&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-end="1785" data-start="1337"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;Researchers disclosed CVE-2026-25874, a critical remote code execution flaw in Hugging Face’s open-source LeRobot platform caused by unsafe pickle deserialization over unauthenticated gRPC channels. The finding matters because robotics AI systems can sit close to sensitive data, expensive compute, and even physical-world operations.&lt;/SPAN&gt;&lt;BR data-end="1674" data-start="1671" /&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgg5nXHCW69t95C6lZ3nZW1lPKlm2DQ20PW9fsNH89j085SW813rpJ4tWQbhW2XPsJH1DLlbDVyvHmF94_Hq0W6qFzzn4pL2qwN395N1xSjt2HW5B1VlP7JqJNvW14PlM21Vv5ZGN99d0j_fkd-7N4L-rZ3b7t2yW14TFFb5VLJMtW1FKRW-8MMRSfW1r7hHg1VK434W8LkgLP7PY0bMN52MZ3HylyX8W6Lzj476FGMTwW5wC9_G49BtxvW1BLzNH5b2ktNW1zywKC2sFPFtW7998qH1dLDB9W5Tl5zX5SdbJzN7rh8jnqXlgJW676wPP6Z5wpXW7cYhl07FkQ0PW7xK3H54SV6ttW4xWhKS8hrQQ1W3zffRP1TmFTkN1Cn4tRl899qVjRKlH6LQ8-_W6SG0rb3hwHt1W7sLnjf4w37NCW3_hJlV2VM5xcW8pBt3-3zSfPzW2dxJ5r4F3n8wW6WY5m41D6X7Xf927sXF04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OjUxOTQ6M2VmMzM5ZDQxNTQ5NjcwMzM1OTJiOTc5NDFlZjgwMTAyZmI1OTIzZmExZjkxM2EyMThlNjQzYTIxMGMyMjFiYTpoOlQ6Tg" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgg5nXHCW69t95C6lZ3nZW1lPKlm2DQ20PW9fsNH89j085SW813rpJ4tWQbhW2XPsJH1DLlbDVyvHmF94_Hq0W6qFzzn4pL2qwN395N1xSjt2HW5B1VlP7JqJNvW14PlM21Vv5ZGN99d0j_fkd-7N4L-rZ3b7t2yW14TFFb5VLJMtW1FKRW-8MMRSfW1r7hHg1VK434W8LkgLP7PY0bMN52MZ3HylyX8W6Lzj476FGMTwW5wC9_G49BtxvW1BLzNH5b2ktNW1zywKC2sFPFtW7998qH1dLDB9W5Tl5zX5SdbJzN7rh8jnqXlgJW676wPP6Z5wpXW7cYhl07FkQ0PW7xK3H54SV6ttW4xWhKS8hrQQ1W3zffRP1TmFTkN1Cn4tRl899qVjRKlH6LQ8-_W6SG0rb3hwHt1W7sLnjf4w37NCW3_hJlV2VM5xcW8pBt3-3zSfPzW2dxJ5r4F3n8wW6WY5m41D6X7Xf927sXF04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OjUxOTQ6M2VmMzM5ZDQxNTQ5NjcwMzM1OTJiOTc5NDFlZjgwMTAyZmI1OTIzZmExZjkxM2EyMThlNjQzYTIxMGMyMjFiYTpoOlQ6Tg" rel="noopener" data-outlook-id="18a482da-fb6a-4be6-8640-fdee1237bcac" data-hs-link-id-v2="ykiy7Uq2" data-hs-link-id="0" target="_blank"&gt;Read The Hacker News report&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-end="1840" data-start="1787" data-section-id="wf5wvd"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;Google Finds Prompt Injection Rising in the Wild&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-end="2276" data-start="1841"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;Google researchers scanned the public web and found growing evidence of indirect prompt injection attempts, including prompts aimed at data exfiltration and destructive actions. The sophistication remains limited for now, but the trendline is clear: attackers are experimenting, and agentic AI makes the payoff bigger.&lt;/SPAN&gt;&lt;BR data-end="2162" data-start="2159" /&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgg5nXHCW69t95C6lZ3l9W5hcvyG3Qlq_5W1B_s00756kGzW5BBbP24SvvB9W4fjqPn1t2CQRW1l3Grf6fRvkRN5t82BPkM1CqW6zk6CK7Wc86GW6pmhBY4fpfmPW12cq-g75HRPJW3h5y3p6-hrmmW8n3s7P8dlDqcW2xG1Rk3hD4gmW6lf5rz34J1k3W5j0d6092Fv_CVJP8X0709zBZW5VLsn61blMN2W90mPyj4j_kQ6W1DNFcx40RgLNW7x-qbR8xtVC8W6Tcsyd5ZgRqlW93PM_281-Xh1VHVRx030hvQpN23lbcWhD4zMW1MDGK-8ZQq-QW73JG3S11NPrjW5xS1sX4wdQK7W63S_q65sJ6j-W5cZhsT3kyxzkW6BqfxW37S-yrW1gTPYw5y0p8cW49VP5y3KkfkFW6NY5Zt45RwNhW7TD4LG4CkBqpW1M7nFV3ns5VGW30k_D95XKkHbW88X6ZQ7VQNc-f8kKGkz04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OmI0MGU6ZGU4ZjMyMmMxZmY1NTQwZTFiZmM2MDlhY2QzOTc3ZDYxNTcwYTIxMTBiNTdjODBiYTQ5NjAzY2NkZWUxMzNkODpoOlQ6Tg" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgg5nXHCW69t95C6lZ3l9W5hcvyG3Qlq_5W1B_s00756kGzW5BBbP24SvvB9W4fjqPn1t2CQRW1l3Grf6fRvkRN5t82BPkM1CqW6zk6CK7Wc86GW6pmhBY4fpfmPW12cq-g75HRPJW3h5y3p6-hrmmW8n3s7P8dlDqcW2xG1Rk3hD4gmW6lf5rz34J1k3W5j0d6092Fv_CVJP8X0709zBZW5VLsn61blMN2W90mPyj4j_kQ6W1DNFcx40RgLNW7x-qbR8xtVC8W6Tcsyd5ZgRqlW93PM_281-Xh1VHVRx030hvQpN23lbcWhD4zMW1MDGK-8ZQq-QW73JG3S11NPrjW5xS1sX4wdQK7W63S_q65sJ6j-W5cZhsT3kyxzkW6BqfxW37S-yrW1gTPYw5y0p8cW49VP5y3KkfkFW6NY5Zt45RwNhW7TD4LG4CkBqpW1M7nFV3ns5VGW30k_D95XKkHbW88X6ZQ7VQNc-f8kKGkz04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OmI0MGU6ZGU4ZjMyMmMxZmY1NTQwZTFiZmM2MDlhY2QzOTc3ZDYxNTcwYTIxMTBiNTdjODBiYTQ5NjAzY2NkZWUxMzNkODpoOlQ6Tg" rel="noopener" data-outlook-id="368dd79a-6956-48aa-b6ba-62c9d7233aab" data-hs-link-id-v2="8sS6S6fd" data-hs-link-id="0" target="_blank"&gt;Read Google’s security blog&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-end="2323" data-start="2278" data-section-id="2311w"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;AI Coding Agent Deletes Company Database&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-end="2759" data-start="2324"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;An AI coding agent powered by Claude deleted a company’s production database and backups despite explicit safety rules. The incident is a sharp warning for teams giving agents write access to live systems: guardrails are not a substitute for permissions, isolation, and recovery controls.&lt;/SPAN&gt;&lt;BR data-end="2646" data-start="2643" /&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgz7mt9PW6N2kFb6lZ3ktW8QFJk-9274dQM93gs6djDHmW8K7B_b5wvR1kW73L8lj7B3ZxPVJqYNq8b7n_mN1ZTVr32HPFTW1F3rdd6Zl9knW8sTKLh8wGFgzV3Cr-D8Qw5bMW2vQV-24mY00WVb_6sJ3fYT3qW2WGdcs540zdTN24LhmFKHGk8V62gJ02stx_jW7MpHJQ9kW5MVW7QL2zS7jwj3ZN25KmdQN6hgDV-pn_p4kCcdtW22xwd37YQQ7pW37GTWX5ZmX2lN8VKfbW75TTNVyv9ZL3tbYK8W1pj3wG6QHX2fVFbSyC544fRHW7MYtCG3bgk36W5XQyT87lR0-5W1czlXR3-M4KnW2L2zF08KCS1gW63RJhc5F0qPmW4Zc91l6Zqf9SW7lYC543TB4XXW3dK9vd8MSg9rVLwhcg87R9wYW7PzZ0v2RbJt3W5YfY0y52NhKyW5-VSw49bW5ZwW8ZmTTH75Zr55W3d5r573Tt5VqW3ZqWM_2CnwrZW4vp42h8ZR7WKW2Gc-XK7qQwL0W5hF8SZ4rCrgvW2T1ZlN5NvRFkW6vS9r01HhyPLW7z_rgf71Lkr7Mcc0R2qWt1WW5vVCB06h2-tpW9g1mpw4W2zdJW1b4s8r652Z8nN6FLxT1nxdfnN67svKP8N8c-W240WV635_-gVW7lZdL322p9s5W1F-_Sv9c0kLyf2jM2HC04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OmFmOTk6ODkwMmJiMzVmNWQ4MjNjZTJiNWExNDI4MmUxNzc0ZmZiODQzN2Y0YzFlNzVmYzJmZDJlYTg0MTdlODExOTQ5YTpoOlQ6Tg" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgz7mt9PW6N2kFb6lZ3ktW8QFJk-9274dQM93gs6djDHmW8K7B_b5wvR1kW73L8lj7B3ZxPVJqYNq8b7n_mN1ZTVr32HPFTW1F3rdd6Zl9knW8sTKLh8wGFgzV3Cr-D8Qw5bMW2vQV-24mY00WVb_6sJ3fYT3qW2WGdcs540zdTN24LhmFKHGk8V62gJ02stx_jW7MpHJQ9kW5MVW7QL2zS7jwj3ZN25KmdQN6hgDV-pn_p4kCcdtW22xwd37YQQ7pW37GTWX5ZmX2lN8VKfbW75TTNVyv9ZL3tbYK8W1pj3wG6QHX2fVFbSyC544fRHW7MYtCG3bgk36W5XQyT87lR0-5W1czlXR3-M4KnW2L2zF08KCS1gW63RJhc5F0qPmW4Zc91l6Zqf9SW7lYC543TB4XXW3dK9vd8MSg9rVLwhcg87R9wYW7PzZ0v2RbJt3W5YfY0y52NhKyW5-VSw49bW5ZwW8ZmTTH75Zr55W3d5r573Tt5VqW3ZqWM_2CnwrZW4vp42h8ZR7WKW2Gc-XK7qQwL0W5hF8SZ4rCrgvW2T1ZlN5NvRFkW6vS9r01HhyPLW7z_rgf71Lkr7Mcc0R2qWt1WW5vVCB06h2-tpW9g1mpw4W2zdJW1b4s8r652Z8nN6FLxT1nxdfnN67svKP8N8c-W240WV635_-gVW7lZdL322p9s5W1F-_Sv9c0kLyf2jM2HC04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OmFmOTk6ODkwMmJiMzVmNWQ4MjNjZTJiNWExNDI4MmUxNzc0ZmZiODQzN2Y0YzFlNzVmYzJmZDJlYTg0MTdlODExOTQ5YTpoOlQ6Tg" rel="noopener" data-outlook-id="488f8056-35ea-43aa-93a5-fcad2123e72e" data-hs-link-id-v2="0qp7/img" data-hs-link-id="0" target="_blank"&gt;Read the&amp;nbsp;report&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-end="2801" data-start="2761" data-section-id="17d0ljp"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;SenseTime Open-Sources SenseNova U1&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-end="3246" data-start="2802"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;SenseTime released SenseNova U1, an open-source image model built for fast multimodal generation and interpretation, including support for Chinese-made chips. The launch shows how open-source AI competition is increasingly shaped by hardware constraints, export controls, and demand for efficient multimodal systems.&lt;/SPAN&gt;&lt;BR data-end="3121" data-start="3118" /&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgz5nXHCW6N1X8z6lZ3l7VdJd1B5knLQpW7wS0DL5qZZGsW2Y2dz98DcMhHMTyV_pmPY5kN1fdVrxVDfQYW4gdLsK3BK7rPN6slJsgYBqf-W8Bjr2R7Wn4L6W1jQtyN6_7TBXN3yVGkGSzz11W7LwWBG1Nl1zWW1kKGb95SDPwRW5hjdVm9lvCk6W6JGhMK5CxJPFW8lN7Hf46nBqwW3pD_8V1zMXF6W6ZJ-Mx2-0FxBVyB9Q21sLL0ZW74HLv77fb6mBVPVDmj3q5gCyW228ySp1WFhWFW1YH8966jnWjtW4TP6r_1P9C0wW5yzKRj99hL60W1Tr6Ll5W9_PZM16D_kk16gvW8FPx2h74v24MW4mkPnF2PlnYxW64KtdP1n2wDxW2W06QT3Vxn6wN7fP69VTw9MFW7p5Bg-8VGxF2W4vWsW_3cwpqTW3VhQXp1PWTS9W4pJNYZ1k0kqyW9f8zT77wBY5-W2P0rbs94fPMCW8zDTG_3XwDBBf1F-q-j04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OjZiYjY6MjAwMGUxMTc0NjNhYThmNTJkN2QzZDE5MWM0ZGQ1OTgyZjIyZTFkYzhjN2YwYmM4ZWJjNmI2Nzg4YzlkZjE0MjpoOlQ6Tg" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgz5nXHCW6N1X8z6lZ3l7VdJd1B5knLQpW7wS0DL5qZZGsW2Y2dz98DcMhHMTyV_pmPY5kN1fdVrxVDfQYW4gdLsK3BK7rPN6slJsgYBqf-W8Bjr2R7Wn4L6W1jQtyN6_7TBXN3yVGkGSzz11W7LwWBG1Nl1zWW1kKGb95SDPwRW5hjdVm9lvCk6W6JGhMK5CxJPFW8lN7Hf46nBqwW3pD_8V1zMXF6W6ZJ-Mx2-0FxBVyB9Q21sLL0ZW74HLv77fb6mBVPVDmj3q5gCyW228ySp1WFhWFW1YH8966jnWjtW4TP6r_1P9C0wW5yzKRj99hL60W1Tr6Ll5W9_PZM16D_kk16gvW8FPx2h74v24MW4mkPnF2PlnYxW64KtdP1n2wDxW2W06QT3Vxn6wN7fP69VTw9MFW7p5Bg-8VGxF2W4vWsW_3cwpqTW3VhQXp1PWTS9W4pJNYZ1k0kqyW9f8zT77wBY5-W2P0rbs94fPMCW8zDTG_3XwDBBf1F-q-j04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OjZiYjY6MjAwMGUxMTc0NjNhYThmNTJkN2QzZDE5MWM0ZGQ1OTgyZjIyZTFkYzhjN2YwYmM4ZWJjNmI2Nzg4YzlkZjE0MjpoOlQ6Tg" rel="noopener" data-outlook-id="e03f4852-c1d4-4438-9fb8-37011b500715" data-hs-link-id-v2="b1afDkYA" data-hs-link-id="0" target="_blank"&gt;Read WIRED’s coverage&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-end="3309" data-start="3248" data-section-id="vv0djs"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;Google Expands Gemini Across Desktop, Music, and Visuals&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-end="3702" data-start="3310"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;Google’s April Gemini Drop added a native Mac app, longer music generation with Lyria 3 Pro, and interactive visual explanations inside Gemini. It’s another step toward AI assistants becoming less like chatboxes and more like embedded work, learning, and creative companions.&lt;/SPAN&gt;&lt;BR data-end="3588" data-start="3585" /&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgg5nXHCW69t95C6lZ3m8W387sRT7pqjMzW3-2vXr2q51sPN2qByKy4smzyW31qbbn7GSV4wN3KYj8PYCv3kVVJ7201wlmqxW8yd6n658JmPXN4NY_WTPSmVlW57dZLG1tHvjcW48gX1s3lhDwBW6TFm5H4WXPjMW7QLJBj3WtMzkW1xhhf01HxCDyW3JWqMc3NN_TcW53Mz_J7DqYnbV4Vbfb5PS3NQW1mgNBP70qfqbW5C3RN73PJPvxW6FyvHy1H_Hc1W4SYKpG9394qqW2n0fRW3x6n2wW72X6Qs6ztyd9W2kS86n8qYy5SV7-MxL59cL6ZW9bln4H2V8KqBW1bZl-24m7c9FW9hh4_s5P9vg2W91zXQ88btY7CW8WLzmN1kMyHGN3kwkc8vnxpfW5357NJ8swCw6W7QJwS12q4wPxW19-7N74fgWMVW6_PFNh7sxNhWW8pBMg84nm1mVW2d8lWV6y364yf5kCzRj04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OjViYzc6YmQ2NjExMGQ0OWU3YTQ2NzU3Y2Q3NzcxNjg5NDk3YjY1MjE0YWYzYjE3Mjc4ODgzNzFkZDIzOGE5ODY4MWJkMDpoOlQ6Tg" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgg5nXHCW69t95C6lZ3m8W387sRT7pqjMzW3-2vXr2q51sPN2qByKy4smzyW31qbbn7GSV4wN3KYj8PYCv3kVVJ7201wlmqxW8yd6n658JmPXN4NY_WTPSmVlW57dZLG1tHvjcW48gX1s3lhDwBW6TFm5H4WXPjMW7QLJBj3WtMzkW1xhhf01HxCDyW3JWqMc3NN_TcW53Mz_J7DqYnbV4Vbfb5PS3NQW1mgNBP70qfqbW5C3RN73PJPvxW6FyvHy1H_Hc1W4SYKpG9394qqW2n0fRW3x6n2wW72X6Qs6ztyd9W2kS86n8qYy5SV7-MxL59cL6ZW9bln4H2V8KqBW1bZl-24m7c9FW9hh4_s5P9vg2W91zXQ88btY7CW8WLzmN1kMyHGN3kwkc8vnxpfW5357NJ8swCw6W7QJwS12q4wPxW19-7N74fgWMVW6_PFNh7sxNhWW8pBMg84nm1mVW2d8lWV6y364yf5kCzRj04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OjViYzc6YmQ2NjExMGQ0OWU3YTQ2NzU3Y2Q3NzcxNjg5NDk3YjY1MjE0YWYzYjE3Mjc4ODgzNzFkZDIzOGE5ODY4MWJkMDpoOlQ6Tg" rel="noopener" data-outlook-id="c614652f-d0d9-4a39-8251-cb2e83006e79" data-hs-link-id-v2="j66BFsls" data-hs-link-id="0" target="_blank"&gt;Read Google’s announcement&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-end="3768" data-start="3704" data-section-id="1bvykrp"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;In Case You Missed It: AI Has Stopped Asking for Permission&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-end="4231" data-start="3769"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;This week on the Lakera blog, we looked at the shift from AI systems that suggest to AI systems that act:&amp;nbsp;retrieving data, invoking APIs, modifying records, and triggering workflows. The takeaway: security teams need visibility not just into what AI can access, but what it is doing across employees, applications, and autonomous agents.&lt;/SPAN&gt;&lt;BR data-end="4110" data-start="4107" /&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgz5nXHCW6N1X8z6lZ3m2W6Xqltr1wC7_FW4zRY43487rP1W8ZS1Rb3P-FMmW5Yg4qj1FTrc9W7m2bMV5V1N4KW1ShVwk5mF-cnW90q4n92R5fMcW3jdqqK1j7Zw1W629Kws966RGsW942VTp6tnRxMW5kW5GC25VY5pW1FfHBY2cxHB7W3yj9PN1t-40rW31W6Fj5hstzrW9jFFgj5xQJmwW1B0zYT2_Y5D7W2tjcpt2yY89JW18xLBJ3JQqY2VqnJHt1x1kWWW4DXSDQ6VTcB5W8MkmJG5PBbSTW8gc1bj41cR9fW2w_9DX69dVBrW7pcJDr6-PVnTW3DZShQ5YzvhfN7Bn8wCM_f28W3Fn93s7P6hfpW5kZZm94F-m0fW7FL_NB8-41gHW2fTbPy3VftkzN5pWkVJPPqf1W7h98cB2j0f9XVPMBnh7y2tw9W35XxXS4_t2zpW6hGFQk2PqdWcW36_2Rm3jmXG2W6XDgsd76lHzyW31_L884WRczpf7X-q4004___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OjYyYjA6NDIxNTRkNDM4ZDA3NDI2MTM1MTI1MmVlYmVlMjQxNGU4ZDA5ODIwMWFhYmNiY2VjN2Y0Y2UxZjkyNmU1NWRiZTpoOlQ6Tg" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgz5nXHCW6N1X8z6lZ3m2W6Xqltr1wC7_FW4zRY43487rP1W8ZS1Rb3P-FMmW5Yg4qj1FTrc9W7m2bMV5V1N4KW1ShVwk5mF-cnW90q4n92R5fMcW3jdqqK1j7Zw1W629Kws966RGsW942VTp6tnRxMW5kW5GC25VY5pW1FfHBY2cxHB7W3yj9PN1t-40rW31W6Fj5hstzrW9jFFgj5xQJmwW1B0zYT2_Y5D7W2tjcpt2yY89JW18xLBJ3JQqY2VqnJHt1x1kWWW4DXSDQ6VTcB5W8MkmJG5PBbSTW8gc1bj41cR9fW2w_9DX69dVBrW7pcJDr6-PVnTW3DZShQ5YzvhfN7Bn8wCM_f28W3Fn93s7P6hfpW5kZZm94F-m0fW7FL_NB8-41gHW2fTbPy3VftkzN5pWkVJPPqf1W7h98cB2j0f9XVPMBnh7y2tw9W35XxXS4_t2zpW6hGFQk2PqdWcW36_2Rm3jmXG2W6XDgsd76lHzyW31_L884WRczpf7X-q4004___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OjYyYjA6NDIxNTRkNDM4ZDA3NDI2MTM1MTI1MmVlYmVlMjQxNGU4ZDA5ODIwMWFhYmNiY2VjN2Y0Y2UxZjkyNmU1NWRiZTpoOlQ6Tg" rel="noopener" data-outlook-id="d024504d-ed32-48c0-a2ca-679198339c3f" data-ogsc="rgb(0, 0, 0)" data-hs-link-id-v2="k9IDYG2/" data-hs-link-id="0" data-end="4231" data-start="4113" target="_blank"&gt;Read the Lakera blog&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-end="4231" data-start="3769"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="4231" data-start="3769"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="2561" data-start="2405"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;From prompt injection on the open web to autonomous agents touching production systems, this week’s theme is clear: AI risk is moving from theory into operations. The teams that treat AI as an active execution layer, not just another app,&amp;nbsp;will be better prepared for what comes next.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-end="3659" data-start="3639"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="3659" data-start="3639"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;See you next week!&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 03 May 2026 10:03:58 GMT</pubDate>
    <dc:creator>Askal</dc:creator>
    <dc:date>2026-05-03T10:03:58Z</dc:date>
    <item>
      <title>Lakera Bulletin - This Week in AI: Cyber Models, Prompt Injection, and Agentic AI Gone Wrong</title>
      <link>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-Bulletin-This-Week-in-AI-Cyber-Models-Prompt-Injection/m-p/276404#M95</link>
      <description>&lt;P data-end="329" data-start="13"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;AI security took center stage this week:&amp;nbsp;from cyber-only frontier models and fast-moving infrastructure flaws, to prompt injections surfacing across the public web. We also saw a real-world reminder of what can happen when coding agents get production access, plus new multimodal releases from SenseTime and Google.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-end="349" data-start="331"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;Let’s get into it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-end="387" data-start="351" data-section-id="cuzpxd"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;OpenAI Plans a Cyber-Only Model&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-end="813" data-start="388"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;OpenAI is preparing GPT-5.5-Cyber, a cybersecurity-focused model reportedly limited to vetted “critical cyber defenders” at launch. The move reflects a growing shift toward restricted access for highly capable cyber AI tools,&amp;nbsp;useful for defenders, but risky in the wrong hands.&lt;/SPAN&gt;&lt;BR data-end="669" data-start="666" /&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgT5nXHCW7lCGcx6lZ3mzW4FFyrP6h_c0vW95yjvs4LlY3jW28Zslv3qfsl9W3JGs1Z8_NpS3W10kBF34mnYGfW16tz7X6q8KySN6CKlG2ZJDf6W1jNrWv4L60FHW7H_6s-3RS-K-W2jqB3z7RplJyN5s_P1QfP30JVjBMHt35bjktW2gMDKS5xBZLnW3BlnwV5tJn9bW7NgL017yWnL8W6VLR4N5X6-zsN5x1wXMThPQqW3hwwTN4yfHK0N5pyDgHrTKV7W4BLtLc3rQz6kN4pBqTg1lSXFN637-5C7y1rKW6DD2Ws7HfSPZV9KhZy7-LG0VW3pVyLn7JY9-lVv-Wgc44Z7HqW5Dv1z76Bcv_TW8bKvnl6wr1hVW8_Kr5V5FTj_1W1xKFHk6knxgWW7mBTjc11HbVCW7XglCP44Dnb5N10Jtsp9GQG_W74wQ6H2jXd5wW5VKxcR5V7vyZW6z9QKc1YRRNHW4S1Vrz9hqZWkW7vlHyb1nJdqLV6jMp44NGqZ7W96qnFM7HJC5_f2Rh4Sb04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OjhkOTY6ZDQwN2MzMzlhNzM4MjgyOWEwZjg1YzZhNWNlMDQ2OGE5ZmQyNTgxYTZjNmJiZGVmZjY5YzM3NTE2ZGMxZDFhZjpoOlQ6Tg" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgT5nXHCW7lCGcx6lZ3mzW4FFyrP6h_c0vW95yjvs4LlY3jW28Zslv3qfsl9W3JGs1Z8_NpS3W10kBF34mnYGfW16tz7X6q8KySN6CKlG2ZJDf6W1jNrWv4L60FHW7H_6s-3RS-K-W2jqB3z7RplJyN5s_P1QfP30JVjBMHt35bjktW2gMDKS5xBZLnW3BlnwV5tJn9bW7NgL017yWnL8W6VLR4N5X6-zsN5x1wXMThPQqW3hwwTN4yfHK0N5pyDgHrTKV7W4BLtLc3rQz6kN4pBqTg1lSXFN637-5C7y1rKW6DD2Ws7HfSPZV9KhZy7-LG0VW3pVyLn7JY9-lVv-Wgc44Z7HqW5Dv1z76Bcv_TW8bKvnl6wr1hVW8_Kr5V5FTj_1W1xKFHk6knxgWW7mBTjc11HbVCW7XglCP44Dnb5N10Jtsp9GQG_W74wQ6H2jXd5wW5VKxcR5V7vyZW6z9QKc1YRRNHW4S1Vrz9hqZWkW7vlHyb1nJdqLV6jMp44NGqZ7W96qnFM7HJC5_f2Rh4Sb04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OjhkOTY6ZDQwN2MzMzlhNzM4MjgyOWEwZjg1YzZhNWNlMDQ2OGE5ZmQyNTgxYTZjNmJiZGVmZjY5YzM3NTE2ZGMxZDFhZjpoOlQ6Tg" rel="noopener" data-outlook-id="895830b4-1265-4d96-b09d-ed2747f0ef96" data-hs-link-id-v2="0XhdzKcW" data-hs-link-id="0" target="_blank"&gt;Read The Verge coverage&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-end="865" data-start="815" data-section-id="sfo4i1"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;LiteLLM Discloses Critical SQL Injection Flaw&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-end="1284" data-start="866"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;LiteLLM published a security update for CVE-2026-42208, a SQL injection vulnerability in its proxy’s API key verification path. For teams routing model calls through AI gateways, it’s a reminder that LLM infrastructure is now critical infrastructure,&amp;nbsp;and needs the same urgency as any exposed auth layer.&lt;/SPAN&gt;&lt;BR data-end="1174" data-start="1171" /&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgg5nXHCW69t95C6lZ3q7W5D3Bxv78SxpKW4rFvj798fCN1W549VYL22j4zGW1hkr-97fNnnwW5WrS2B2d_hhQW20Hf2Z2CVY8JW2F99Tx1gyhP0W6jpxM17C1NHPW6_l5gk7PlfQjVTgkPL49ZTRQW80M-b_4cSfGNMqHdvGSrFYpW4HxWqy3CxQ4wW2xHB_L71MGCsW8d0XTr5t6X3xW3FsLyF3lcdDKW92skM313V0QzW7MRM001s5w0PW8TNvkn3SwjjlW3-n1mr97VGKGW8qDz3W5hzzs4W5HJ4QM1kQR2TV9By2f7DvCP6W9k39vx6sB6l-N95_0xzXLktVW6vWGPR2qRFfpW4NqNLj130HsdW5YFRm_72Mjk4W1K7Q7n4ch_NlW4sMX3n23fwcdW2GDPL45z5rPRW8wfpN74swDVqW3ZwYYr2t2Dm8W3xMFSg8p17lMW618G_046CVxSW68pM0p1jqsq4f1zkMz-04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OmQxZGM6YWY1Y2RlMmNlZmZiNGRjOWVjZGU0NjJmNzdhNjk3YmY0OTQ0NGE2NjEyODg5MWVlYWFiNmFhODgzZjM5M2UxZDpoOlQ6Tg" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgg5nXHCW69t95C6lZ3q7W5D3Bxv78SxpKW4rFvj798fCN1W549VYL22j4zGW1hkr-97fNnnwW5WrS2B2d_hhQW20Hf2Z2CVY8JW2F99Tx1gyhP0W6jpxM17C1NHPW6_l5gk7PlfQjVTgkPL49ZTRQW80M-b_4cSfGNMqHdvGSrFYpW4HxWqy3CxQ4wW2xHB_L71MGCsW8d0XTr5t6X3xW3FsLyF3lcdDKW92skM313V0QzW7MRM001s5w0PW8TNvkn3SwjjlW3-n1mr97VGKGW8qDz3W5hzzs4W5HJ4QM1kQR2TV9By2f7DvCP6W9k39vx6sB6l-N95_0xzXLktVW6vWGPR2qRFfpW4NqNLj130HsdW5YFRm_72Mjk4W1K7Q7n4ch_NlW4sMX3n23fwcdW2GDPL45z5rPRW8wfpN74swDVqW3ZwYYr2t2Dm8W3xMFSg8p17lMW618G_046CVxSW68pM0p1jqsq4f1zkMz-04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OmQxZGM6YWY1Y2RlMmNlZmZiNGRjOWVjZGU0NjJmNzdhNjk3YmY0OTQ0NGE2NjEyODg5MWVlYWFiNmFhODgzZjM5M2UxZDpoOlQ6Tg" rel="noopener" data-outlook-id="2d8f50b0-56aa-4504-a404-865a644ee492" data-hs-link-id-v2="orzqfjbR" data-hs-link-id="0" target="_blank"&gt;Read the LiteLLM security update&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-end="1336" data-start="1286" data-section-id="pxlk2i"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;Hugging Face LeRobot Hit by RCE Vulnerability&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-end="1785" data-start="1337"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;Researchers disclosed CVE-2026-25874, a critical remote code execution flaw in Hugging Face’s open-source LeRobot platform caused by unsafe pickle deserialization over unauthenticated gRPC channels. The finding matters because robotics AI systems can sit close to sensitive data, expensive compute, and even physical-world operations.&lt;/SPAN&gt;&lt;BR data-end="1674" data-start="1671" /&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgg5nXHCW69t95C6lZ3nZW1lPKlm2DQ20PW9fsNH89j085SW813rpJ4tWQbhW2XPsJH1DLlbDVyvHmF94_Hq0W6qFzzn4pL2qwN395N1xSjt2HW5B1VlP7JqJNvW14PlM21Vv5ZGN99d0j_fkd-7N4L-rZ3b7t2yW14TFFb5VLJMtW1FKRW-8MMRSfW1r7hHg1VK434W8LkgLP7PY0bMN52MZ3HylyX8W6Lzj476FGMTwW5wC9_G49BtxvW1BLzNH5b2ktNW1zywKC2sFPFtW7998qH1dLDB9W5Tl5zX5SdbJzN7rh8jnqXlgJW676wPP6Z5wpXW7cYhl07FkQ0PW7xK3H54SV6ttW4xWhKS8hrQQ1W3zffRP1TmFTkN1Cn4tRl899qVjRKlH6LQ8-_W6SG0rb3hwHt1W7sLnjf4w37NCW3_hJlV2VM5xcW8pBt3-3zSfPzW2dxJ5r4F3n8wW6WY5m41D6X7Xf927sXF04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OjUxOTQ6M2VmMzM5ZDQxNTQ5NjcwMzM1OTJiOTc5NDFlZjgwMTAyZmI1OTIzZmExZjkxM2EyMThlNjQzYTIxMGMyMjFiYTpoOlQ6Tg" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgg5nXHCW69t95C6lZ3nZW1lPKlm2DQ20PW9fsNH89j085SW813rpJ4tWQbhW2XPsJH1DLlbDVyvHmF94_Hq0W6qFzzn4pL2qwN395N1xSjt2HW5B1VlP7JqJNvW14PlM21Vv5ZGN99d0j_fkd-7N4L-rZ3b7t2yW14TFFb5VLJMtW1FKRW-8MMRSfW1r7hHg1VK434W8LkgLP7PY0bMN52MZ3HylyX8W6Lzj476FGMTwW5wC9_G49BtxvW1BLzNH5b2ktNW1zywKC2sFPFtW7998qH1dLDB9W5Tl5zX5SdbJzN7rh8jnqXlgJW676wPP6Z5wpXW7cYhl07FkQ0PW7xK3H54SV6ttW4xWhKS8hrQQ1W3zffRP1TmFTkN1Cn4tRl899qVjRKlH6LQ8-_W6SG0rb3hwHt1W7sLnjf4w37NCW3_hJlV2VM5xcW8pBt3-3zSfPzW2dxJ5r4F3n8wW6WY5m41D6X7Xf927sXF04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OjUxOTQ6M2VmMzM5ZDQxNTQ5NjcwMzM1OTJiOTc5NDFlZjgwMTAyZmI1OTIzZmExZjkxM2EyMThlNjQzYTIxMGMyMjFiYTpoOlQ6Tg" rel="noopener" data-outlook-id="18a482da-fb6a-4be6-8640-fdee1237bcac" data-hs-link-id-v2="ykiy7Uq2" data-hs-link-id="0" target="_blank"&gt;Read The Hacker News report&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-end="1840" data-start="1787" data-section-id="wf5wvd"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;Google Finds Prompt Injection Rising in the Wild&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-end="2276" data-start="1841"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;Google researchers scanned the public web and found growing evidence of indirect prompt injection attempts, including prompts aimed at data exfiltration and destructive actions. The sophistication remains limited for now, but the trendline is clear: attackers are experimenting, and agentic AI makes the payoff bigger.&lt;/SPAN&gt;&lt;BR data-end="2162" data-start="2159" /&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgg5nXHCW69t95C6lZ3l9W5hcvyG3Qlq_5W1B_s00756kGzW5BBbP24SvvB9W4fjqPn1t2CQRW1l3Grf6fRvkRN5t82BPkM1CqW6zk6CK7Wc86GW6pmhBY4fpfmPW12cq-g75HRPJW3h5y3p6-hrmmW8n3s7P8dlDqcW2xG1Rk3hD4gmW6lf5rz34J1k3W5j0d6092Fv_CVJP8X0709zBZW5VLsn61blMN2W90mPyj4j_kQ6W1DNFcx40RgLNW7x-qbR8xtVC8W6Tcsyd5ZgRqlW93PM_281-Xh1VHVRx030hvQpN23lbcWhD4zMW1MDGK-8ZQq-QW73JG3S11NPrjW5xS1sX4wdQK7W63S_q65sJ6j-W5cZhsT3kyxzkW6BqfxW37S-yrW1gTPYw5y0p8cW49VP5y3KkfkFW6NY5Zt45RwNhW7TD4LG4CkBqpW1M7nFV3ns5VGW30k_D95XKkHbW88X6ZQ7VQNc-f8kKGkz04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OmI0MGU6ZGU4ZjMyMmMxZmY1NTQwZTFiZmM2MDlhY2QzOTc3ZDYxNTcwYTIxMTBiNTdjODBiYTQ5NjAzY2NkZWUxMzNkODpoOlQ6Tg" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgg5nXHCW69t95C6lZ3l9W5hcvyG3Qlq_5W1B_s00756kGzW5BBbP24SvvB9W4fjqPn1t2CQRW1l3Grf6fRvkRN5t82BPkM1CqW6zk6CK7Wc86GW6pmhBY4fpfmPW12cq-g75HRPJW3h5y3p6-hrmmW8n3s7P8dlDqcW2xG1Rk3hD4gmW6lf5rz34J1k3W5j0d6092Fv_CVJP8X0709zBZW5VLsn61blMN2W90mPyj4j_kQ6W1DNFcx40RgLNW7x-qbR8xtVC8W6Tcsyd5ZgRqlW93PM_281-Xh1VHVRx030hvQpN23lbcWhD4zMW1MDGK-8ZQq-QW73JG3S11NPrjW5xS1sX4wdQK7W63S_q65sJ6j-W5cZhsT3kyxzkW6BqfxW37S-yrW1gTPYw5y0p8cW49VP5y3KkfkFW6NY5Zt45RwNhW7TD4LG4CkBqpW1M7nFV3ns5VGW30k_D95XKkHbW88X6ZQ7VQNc-f8kKGkz04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OmI0MGU6ZGU4ZjMyMmMxZmY1NTQwZTFiZmM2MDlhY2QzOTc3ZDYxNTcwYTIxMTBiNTdjODBiYTQ5NjAzY2NkZWUxMzNkODpoOlQ6Tg" rel="noopener" data-outlook-id="368dd79a-6956-48aa-b6ba-62c9d7233aab" data-hs-link-id-v2="8sS6S6fd" data-hs-link-id="0" target="_blank"&gt;Read Google’s security blog&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-end="2323" data-start="2278" data-section-id="2311w"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;AI Coding Agent Deletes Company Database&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-end="2759" data-start="2324"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;An AI coding agent powered by Claude deleted a company’s production database and backups despite explicit safety rules. The incident is a sharp warning for teams giving agents write access to live systems: guardrails are not a substitute for permissions, isolation, and recovery controls.&lt;/SPAN&gt;&lt;BR data-end="2646" data-start="2643" /&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgz7mt9PW6N2kFb6lZ3ktW8QFJk-9274dQM93gs6djDHmW8K7B_b5wvR1kW73L8lj7B3ZxPVJqYNq8b7n_mN1ZTVr32HPFTW1F3rdd6Zl9knW8sTKLh8wGFgzV3Cr-D8Qw5bMW2vQV-24mY00WVb_6sJ3fYT3qW2WGdcs540zdTN24LhmFKHGk8V62gJ02stx_jW7MpHJQ9kW5MVW7QL2zS7jwj3ZN25KmdQN6hgDV-pn_p4kCcdtW22xwd37YQQ7pW37GTWX5ZmX2lN8VKfbW75TTNVyv9ZL3tbYK8W1pj3wG6QHX2fVFbSyC544fRHW7MYtCG3bgk36W5XQyT87lR0-5W1czlXR3-M4KnW2L2zF08KCS1gW63RJhc5F0qPmW4Zc91l6Zqf9SW7lYC543TB4XXW3dK9vd8MSg9rVLwhcg87R9wYW7PzZ0v2RbJt3W5YfY0y52NhKyW5-VSw49bW5ZwW8ZmTTH75Zr55W3d5r573Tt5VqW3ZqWM_2CnwrZW4vp42h8ZR7WKW2Gc-XK7qQwL0W5hF8SZ4rCrgvW2T1ZlN5NvRFkW6vS9r01HhyPLW7z_rgf71Lkr7Mcc0R2qWt1WW5vVCB06h2-tpW9g1mpw4W2zdJW1b4s8r652Z8nN6FLxT1nxdfnN67svKP8N8c-W240WV635_-gVW7lZdL322p9s5W1F-_Sv9c0kLyf2jM2HC04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OmFmOTk6ODkwMmJiMzVmNWQ4MjNjZTJiNWExNDI4MmUxNzc0ZmZiODQzN2Y0YzFlNzVmYzJmZDJlYTg0MTdlODExOTQ5YTpoOlQ6Tg" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgz7mt9PW6N2kFb6lZ3ktW8QFJk-9274dQM93gs6djDHmW8K7B_b5wvR1kW73L8lj7B3ZxPVJqYNq8b7n_mN1ZTVr32HPFTW1F3rdd6Zl9knW8sTKLh8wGFgzV3Cr-D8Qw5bMW2vQV-24mY00WVb_6sJ3fYT3qW2WGdcs540zdTN24LhmFKHGk8V62gJ02stx_jW7MpHJQ9kW5MVW7QL2zS7jwj3ZN25KmdQN6hgDV-pn_p4kCcdtW22xwd37YQQ7pW37GTWX5ZmX2lN8VKfbW75TTNVyv9ZL3tbYK8W1pj3wG6QHX2fVFbSyC544fRHW7MYtCG3bgk36W5XQyT87lR0-5W1czlXR3-M4KnW2L2zF08KCS1gW63RJhc5F0qPmW4Zc91l6Zqf9SW7lYC543TB4XXW3dK9vd8MSg9rVLwhcg87R9wYW7PzZ0v2RbJt3W5YfY0y52NhKyW5-VSw49bW5ZwW8ZmTTH75Zr55W3d5r573Tt5VqW3ZqWM_2CnwrZW4vp42h8ZR7WKW2Gc-XK7qQwL0W5hF8SZ4rCrgvW2T1ZlN5NvRFkW6vS9r01HhyPLW7z_rgf71Lkr7Mcc0R2qWt1WW5vVCB06h2-tpW9g1mpw4W2zdJW1b4s8r652Z8nN6FLxT1nxdfnN67svKP8N8c-W240WV635_-gVW7lZdL322p9s5W1F-_Sv9c0kLyf2jM2HC04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OmFmOTk6ODkwMmJiMzVmNWQ4MjNjZTJiNWExNDI4MmUxNzc0ZmZiODQzN2Y0YzFlNzVmYzJmZDJlYTg0MTdlODExOTQ5YTpoOlQ6Tg" rel="noopener" data-outlook-id="488f8056-35ea-43aa-93a5-fcad2123e72e" data-hs-link-id-v2="0qp7/img" data-hs-link-id="0" target="_blank"&gt;Read the&amp;nbsp;report&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-end="2801" data-start="2761" data-section-id="17d0ljp"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;SenseTime Open-Sources SenseNova U1&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-end="3246" data-start="2802"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;SenseTime released SenseNova U1, an open-source image model built for fast multimodal generation and interpretation, including support for Chinese-made chips. The launch shows how open-source AI competition is increasingly shaped by hardware constraints, export controls, and demand for efficient multimodal systems.&lt;/SPAN&gt;&lt;BR data-end="3121" data-start="3118" /&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgz5nXHCW6N1X8z6lZ3l7VdJd1B5knLQpW7wS0DL5qZZGsW2Y2dz98DcMhHMTyV_pmPY5kN1fdVrxVDfQYW4gdLsK3BK7rPN6slJsgYBqf-W8Bjr2R7Wn4L6W1jQtyN6_7TBXN3yVGkGSzz11W7LwWBG1Nl1zWW1kKGb95SDPwRW5hjdVm9lvCk6W6JGhMK5CxJPFW8lN7Hf46nBqwW3pD_8V1zMXF6W6ZJ-Mx2-0FxBVyB9Q21sLL0ZW74HLv77fb6mBVPVDmj3q5gCyW228ySp1WFhWFW1YH8966jnWjtW4TP6r_1P9C0wW5yzKRj99hL60W1Tr6Ll5W9_PZM16D_kk16gvW8FPx2h74v24MW4mkPnF2PlnYxW64KtdP1n2wDxW2W06QT3Vxn6wN7fP69VTw9MFW7p5Bg-8VGxF2W4vWsW_3cwpqTW3VhQXp1PWTS9W4pJNYZ1k0kqyW9f8zT77wBY5-W2P0rbs94fPMCW8zDTG_3XwDBBf1F-q-j04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OjZiYjY6MjAwMGUxMTc0NjNhYThmNTJkN2QzZDE5MWM0ZGQ1OTgyZjIyZTFkYzhjN2YwYmM4ZWJjNmI2Nzg4YzlkZjE0MjpoOlQ6Tg" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgz5nXHCW6N1X8z6lZ3l7VdJd1B5knLQpW7wS0DL5qZZGsW2Y2dz98DcMhHMTyV_pmPY5kN1fdVrxVDfQYW4gdLsK3BK7rPN6slJsgYBqf-W8Bjr2R7Wn4L6W1jQtyN6_7TBXN3yVGkGSzz11W7LwWBG1Nl1zWW1kKGb95SDPwRW5hjdVm9lvCk6W6JGhMK5CxJPFW8lN7Hf46nBqwW3pD_8V1zMXF6W6ZJ-Mx2-0FxBVyB9Q21sLL0ZW74HLv77fb6mBVPVDmj3q5gCyW228ySp1WFhWFW1YH8966jnWjtW4TP6r_1P9C0wW5yzKRj99hL60W1Tr6Ll5W9_PZM16D_kk16gvW8FPx2h74v24MW4mkPnF2PlnYxW64KtdP1n2wDxW2W06QT3Vxn6wN7fP69VTw9MFW7p5Bg-8VGxF2W4vWsW_3cwpqTW3VhQXp1PWTS9W4pJNYZ1k0kqyW9f8zT77wBY5-W2P0rbs94fPMCW8zDTG_3XwDBBf1F-q-j04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OjZiYjY6MjAwMGUxMTc0NjNhYThmNTJkN2QzZDE5MWM0ZGQ1OTgyZjIyZTFkYzhjN2YwYmM4ZWJjNmI2Nzg4YzlkZjE0MjpoOlQ6Tg" rel="noopener" data-outlook-id="e03f4852-c1d4-4438-9fb8-37011b500715" data-hs-link-id-v2="b1afDkYA" data-hs-link-id="0" target="_blank"&gt;Read WIRED’s coverage&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-end="3309" data-start="3248" data-section-id="vv0djs"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;Google Expands Gemini Across Desktop, Music, and Visuals&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-end="3702" data-start="3310"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;Google’s April Gemini Drop added a native Mac app, longer music generation with Lyria 3 Pro, and interactive visual explanations inside Gemini. It’s another step toward AI assistants becoming less like chatboxes and more like embedded work, learning, and creative companions.&lt;/SPAN&gt;&lt;BR data-end="3588" data-start="3585" /&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgg5nXHCW69t95C6lZ3m8W387sRT7pqjMzW3-2vXr2q51sPN2qByKy4smzyW31qbbn7GSV4wN3KYj8PYCv3kVVJ7201wlmqxW8yd6n658JmPXN4NY_WTPSmVlW57dZLG1tHvjcW48gX1s3lhDwBW6TFm5H4WXPjMW7QLJBj3WtMzkW1xhhf01HxCDyW3JWqMc3NN_TcW53Mz_J7DqYnbV4Vbfb5PS3NQW1mgNBP70qfqbW5C3RN73PJPvxW6FyvHy1H_Hc1W4SYKpG9394qqW2n0fRW3x6n2wW72X6Qs6ztyd9W2kS86n8qYy5SV7-MxL59cL6ZW9bln4H2V8KqBW1bZl-24m7c9FW9hh4_s5P9vg2W91zXQ88btY7CW8WLzmN1kMyHGN3kwkc8vnxpfW5357NJ8swCw6W7QJwS12q4wPxW19-7N74fgWMVW6_PFNh7sxNhWW8pBMg84nm1mVW2d8lWV6y364yf5kCzRj04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OjViYzc6YmQ2NjExMGQ0OWU3YTQ2NzU3Y2Q3NzcxNjg5NDk3YjY1MjE0YWYzYjE3Mjc4ODgzNzFkZDIzOGE5ODY4MWJkMDpoOlQ6Tg" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgg5nXHCW69t95C6lZ3m8W387sRT7pqjMzW3-2vXr2q51sPN2qByKy4smzyW31qbbn7GSV4wN3KYj8PYCv3kVVJ7201wlmqxW8yd6n658JmPXN4NY_WTPSmVlW57dZLG1tHvjcW48gX1s3lhDwBW6TFm5H4WXPjMW7QLJBj3WtMzkW1xhhf01HxCDyW3JWqMc3NN_TcW53Mz_J7DqYnbV4Vbfb5PS3NQW1mgNBP70qfqbW5C3RN73PJPvxW6FyvHy1H_Hc1W4SYKpG9394qqW2n0fRW3x6n2wW72X6Qs6ztyd9W2kS86n8qYy5SV7-MxL59cL6ZW9bln4H2V8KqBW1bZl-24m7c9FW9hh4_s5P9vg2W91zXQ88btY7CW8WLzmN1kMyHGN3kwkc8vnxpfW5357NJ8swCw6W7QJwS12q4wPxW19-7N74fgWMVW6_PFNh7sxNhWW8pBMg84nm1mVW2d8lWV6y364yf5kCzRj04___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OjViYzc6YmQ2NjExMGQ0OWU3YTQ2NzU3Y2Q3NzcxNjg5NDk3YjY1MjE0YWYzYjE3Mjc4ODgzNzFkZDIzOGE5ODY4MWJkMDpoOlQ6Tg" rel="noopener" data-outlook-id="c614652f-d0d9-4a39-8251-cb2e83006e79" data-hs-link-id-v2="j66BFsls" data-hs-link-id="0" target="_blank"&gt;Read Google’s announcement&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 data-end="3768" data-start="3704" data-section-id="1bvykrp"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;In Case You Missed It: AI Has Stopped Asking for Permission&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-end="4231" data-start="3769"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;This week on the Lakera blog, we looked at the shift from AI systems that suggest to AI systems that act:&amp;nbsp;retrieving data, invoking APIs, modifying records, and triggering workflows. The takeaway: security teams need visibility not just into what AI can access, but what it is doing across employees, applications, and autonomous agents.&lt;/SPAN&gt;&lt;BR data-end="4110" data-start="4107" /&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A title="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgz5nXHCW6N1X8z6lZ3m2W6Xqltr1wC7_FW4zRY43487rP1W8ZS1Rb3P-FMmW5Yg4qj1FTrc9W7m2bMV5V1N4KW1ShVwk5mF-cnW90q4n92R5fMcW3jdqqK1j7Zw1W629Kws966RGsW942VTp6tnRxMW5kW5GC25VY5pW1FfHBY2cxHB7W3yj9PN1t-40rW31W6Fj5hstzrW9jFFgj5xQJmwW1B0zYT2_Y5D7W2tjcpt2yY89JW18xLBJ3JQqY2VqnJHt1x1kWWW4DXSDQ6VTcB5W8MkmJG5PBbSTW8gc1bj41cR9fW2w_9DX69dVBrW7pcJDr6-PVnTW3DZShQ5YzvhfN7Bn8wCM_f28W3Fn93s7P6hfpW5kZZm94F-m0fW7FL_NB8-41gHW2fTbPy3VftkzN5pWkVJPPqf1W7h98cB2j0f9XVPMBnh7y2tw9W35XxXS4_t2zpW6hGFQk2PqdWcW36_2Rm3jmXG2W6XDgsd76lHzyW31_L884WRczpf7X-q4004___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OjYyYjA6NDIxNTRkNDM4ZDA3NDI2MTM1MTI1MmVlYmVlMjQxNGU4ZDA5ODIwMWFhYmNiY2VjN2Y0Y2UxZjkyNmU1NWRiZTpoOlQ6Tg" href="https://protect.checkpoint.com/v2/r02/___https://d31-0L04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VVJ-KP1BsF6YW4w-xh627b1gVW1MKd8X5Nx7sQN4-lLgz5nXHCW6N1X8z6lZ3m2W6Xqltr1wC7_FW4zRY43487rP1W8ZS1Rb3P-FMmW5Yg4qj1FTrc9W7m2bMV5V1N4KW1ShVwk5mF-cnW90q4n92R5fMcW3jdqqK1j7Zw1W629Kws966RGsW942VTp6tnRxMW5kW5GC25VY5pW1FfHBY2cxHB7W3yj9PN1t-40rW31W6Fj5hstzrW9jFFgj5xQJmwW1B0zYT2_Y5D7W2tjcpt2yY89JW18xLBJ3JQqY2VqnJHt1x1kWWW4DXSDQ6VTcB5W8MkmJG5PBbSTW8gc1bj41cR9fW2w_9DX69dVBrW7pcJDr6-PVnTW3DZShQ5YzvhfN7Bn8wCM_f28W3Fn93s7P6hfpW5kZZm94F-m0fW7FL_NB8-41gHW2fTbPy3VftkzN5pWkVJPPqf1W7h98cB2j0f9XVPMBnh7y2tw9W35XxXS4_t2zpW6hGFQk2PqdWcW36_2Rm3jmXG2W6XDgsd76lHzyW31_L884WRczpf7X-q4004___.YzJlOmNwYWxsOmM6bzpkNmU5ODdmOGMwZWQ0ZmQ0NWIxNTAzMGYzNmU1ZmM5Njo3OjYyYjA6NDIxNTRkNDM4ZDA3NDI2MTM1MTI1MmVlYmVlMjQxNGU4ZDA5ODIwMWFhYmNiY2VjN2Y0Y2UxZjkyNmU1NWRiZTpoOlQ6Tg" rel="noopener" data-outlook-id="d024504d-ed32-48c0-a2ca-679198339c3f" data-ogsc="rgb(0, 0, 0)" data-hs-link-id-v2="k9IDYG2/" data-hs-link-id="0" data-end="4231" data-start="4113" target="_blank"&gt;Read the Lakera blog&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-end="4231" data-start="3769"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="4231" data-start="3769"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="2561" data-start="2405"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;From prompt injection on the open web to autonomous agents touching production systems, this week’s theme is clear: AI risk is moving from theory into operations. The teams that treat AI as an active execution layer, not just another app,&amp;nbsp;will be better prepared for what comes next.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-end="3659" data-start="3639"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="3659" data-start="3639"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)"&gt;See you next week!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 03 May 2026 10:03:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-Bulletin-This-Week-in-AI-Cyber-Models-Prompt-Injection/m-p/276404#M95</guid>
      <dc:creator>Askal</dc:creator>
      <dc:date>2026-05-03T10:03:58Z</dc:date>
    </item>
  </channel>
</rss>

