Signal criticality: High
What happened: Dark Reading published "Human vs AI: Debates Shape RSAC 2026 Cybersecurity Trends". As AI dominated RSAC 2026, CISOs and industry leaders debated its role in security, from agentic applications to the challenges of scaling human involvement in decision-making The article focuses on governance, identity, guardrails, or permission boundaries around AI agents that can act with real system access. The practical question is what permissions, connected data, or follow-on actions this signal can influence in a real deployed workflow.
Key takeaways:
Original source: https://www.darkreading.com/cybersecurity-operations/human-vs-ai-debates-shape-rsac-2026-cybersecurity-trends
Signal criticality: High
What happened: The Hacker News published "Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed". Threat actors are exploiting a maximum-severity security flaw in Flowise, an open-source artificial intelligence (AI) platform, according to new findings from VulnCheck. The vulnerability in question is CVE-2025-59528 (CVSS score: 10.0), a code injection vulnerability that could result in remote code execution. "The CustomMCP node allows users to input configuration settings for connecting The report describes a concrete compromise, exposure, or abuse pattern with direct defensive implications. The practical question is what permissions, connected data, or follow-on actions this signal can influence in a real deployed workflow.
Key takeaways:
Original source: https://thehackernews.com/2026/04/flowise-ai-agent-builder-under-active.html
Signal criticality: High
What happened: Help Net Security reported that microsoft then reported a global peak of 11,000 password-based attacks per second in April 2023. Telemetry from March through September 2024 identified 36 unique IP addresses that matched its signature conditions, a level below 0.01% of analyzed NetFlow. Investigators later found that its 1.8 million bots were generated through exploitation of proxy services. It peaked in June 2023 with over 60,000 actively compromised devices, and more than 200,000 devices were pulled into the botnet over its run.
Key takeaways:
Original source: https://www.helpnetsecurity.com/2026/04/08/large-botnets-campaigns-attack-activity/
Signal criticality: High
What happened: Unit 42 published that threat Research Center Threat Research Malware Malware When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications 15 min read Related Products Code to Cloud Platform Cortex Cortex Cloud Prisma AIRS Unit 42 AI Security Assessment Unit 42 Incident Response By: Jay Chen Royce Lu Published: April 3, 2026 Categories: Malware Threat Research Tags: AI Amazon Bedrock Guardrails LLM Multi-agent Payload Prompt injection Share Note: We do not recommend ingesting this page using an AI agent.
Key takeaways:
Original source: https://unit42.paloaltonetworks.com/amazon-bedrock-multiagent-applications/
The strongest signal today is that AI security is being decided in the surrounding control layer — permissions, connectors, deterministic workflow design, response speed, and the infrastructure that still underpins trust. That is a more durable framing than generic agent hype, and it is the one worth carrying forward.