Aggregator
Spear-Phishing警报:NetBird RAT通过欺骗性工作引诱传播
Одной из древнейших тайн Марса больше нет
ConnectWise ScreenConnect 遭到国家行为者的攻击
天文学家发现以 44 分钟周期发射无线电波和 X 射线的神秘天体
Horizon3 详细介绍 Cisco IOS XE WLC 中的严重文件上传漏洞 (CVE-2025-20188, CVSS 10)
360 斩获国家级信息安全服务最高级别资质 树立行业服务标杆
CVE-2025-21626 | GLPI up to 10.0.17 status.php Name information disclosure (Nessus ID 237566)
CVE-2025-23024 | GLPI up to 10.0.17 install/update.php improper authorization (GHSA-885x-hvp2-85q8 / Nessus ID 237566)
CVE-2025-21627 | GLPI up to 10.0.17 Search Page cross site scripting (GHSA-qm8p-jmj2-qfc2 / Nessus ID 237566)
CVE-2025-21619 | GLPI up to 10.0.17 sql injection (GHSA-pcmc-xv3g-hjxv / Nessus ID 237566)
CVE-2025-25192 | GLPI up to 10.0.17 install/update.php information disclosure (GHSA-86cx-hcfc-8mm8 / Nessus ID 237566)
CVE-2025-23046 | GLPI up to 10.0.17 OauthIMAP Plugin incorrect implementation of authentication algorithm (GHSA-vfxc-qg3v-j2r5 / Nessus ID 237566)
CVE-2024-11955 | GLPI up to 10.0.17 /index.php redirect (GHSA-g5fm-jq4j-c2c7 / Nessus ID 237566)
CVE-2022-25927 | ua-parser-js redos (Nessus ID 237580)
CVE-2025-1763 | GitLab Enterprise Edition up to 17.9.6/17.10.4/17.11.0 Content Security Policy cross site scripting (Issue 521718 / Nessus ID 237585)
CVE-2025-5025 | cURL up to 8.13.0 QUIC Certificate certificate validation (Nessus ID 237584)
CVE-2025-4947 | cURL up to 8.13.0 QUIC Certificate certificate validation (Nessus ID 237583)
The Sequential Kill Chain for AI – FireTail Blog
May 30, 2025 - Timo Rüppell - The Sequential Kill Chain for AI-Powered Attacks
Excerpt: We’ve talked before about Mean Time To Attack, or MTTA, which has grown alarmingly short for new vulnerabilities across the cyber landscape. In this blog, we’ll dive into the “how” and “why” of this…
Summary:
In our current cyber landscape, Mean Time To Attack is shorter than ever, and all signs point to AI being involved. And in the meantime, Mean Time to Patch isn’t getting shorter…
Blog text:
AI security is a critical challenge in 2025. Developers and security experts are struggling to stay ahead of attacks that are continuing to rise in volume and complexity. We’ve seen a rapid increase in the number of breaches and new kinds of attacks, such as indirect prompt injection. Many researchers believe that AI is partially responsible for attacks growing and advancing at such a rapid rate. Mean Time To Attack, or MMTA, is the time it takes for a new vulnerability to be exploited in the wild. In recent years, we’ve seen this number decrease dramatically to only 22 minutes. On the other hand, the Mean Time To Patch, or MTTP, is still extremely long, sitting around 50 to 160 days, which is more than enough time for attackers and bad actors to exploit the vulnerabilities repeatedly and even find more weak spots. Pictured below is the Sequential Kill Chain for AI-Powered attacks. The early stages of the kill chain- Recon, Weaponize, and Deliver, to Exploit- are occurring at a rate that seems too fast to not be automated in a lot of cases. If hackers had to do each step manually- reconnaissance into APIs or web apps looking for vulnerabilities, figuring out how to exploit them, then building and deploying the code, delivering these attacks until one of them is successful- it would take a lot longer than 22 minutes, even with the most experienced threat actors. And we already know this is possible from cases like when researchers got ChatGPT 4 to exploit one-day vulnerabilities. They tested this method across 15 different sites, container management software, and Python packages. Their findings were shocking. ChatGPT was able to correctly exploit one-day vulnerabilities 87% of the time. (IBM)
So what does this mean?
Developers and security teams need to work together and stay vigilant and aware of the risks. Since vulnerabilities are being exploited so rapidly, they need to be addressed proactively and the best way to do this is to employ the principles of “secure by design.” “Secure by design,” is effectively the process of eliminating vulnerabilities as you build. There are multiple types of ways to employ “secure by design,” including code analysis and continuous security testing throughout every stage of development. Now more than ever, security needs to be a top concern from code to cloud. We’ve talked before about how secure by design is the best way to enforce security postures before platforms even go live in their environment. But with MTTA sitting so incredibly low, and MTTP remaining high, this construct is even more critical. And unfortunately, it seems like this problem is going to get worse before it gets better. Based on the data, the industry behavior around patching has been consistent for the past two decades. Quite simply, vulnerabilities are not taken seriously enough. There also may be a need down the line for automated deployments that can fix a vulnerability and deploy the patch within minutes, instead of months. One of the best ways to do this is to rely heavily on infrastructure as code, with fully automated pipelines. Once a vulnerability is identified, push the patch in code, and initiate a build and deploy automation. This is the same for both AI security and API security. APIs power the different platforms that provide data to LLMs, so without APIs, there is no AI. Therefore: AI security is API security. And as with vulnerability exploit mitigation, the best way to fix an API is in the security of its design. Analyzing the design for security weaknesses with automated testing during the design and build phase, coupled with automated updates when issues are fixed, leads to the best and most consistent security outcomes.
Takeaways
We are seeing a rapid surge of attacks powered by AI. AI can automate steps of the sequential kill chain, as we’ve already seen with OpenAI, making it much simpler to find, analyse, and exploit vulnerabilities in real-time. For this reason, researchers suspect AI is responsible for the decrease in Mean Time To Attack of vulnerabilities. On the other hand, Mean Time to Patch remains high for vulnerabilities across the board, leaving them open to attack for prolonged periods of time. The only solution is for developers and security teams to stay vigilant by employing practices such as “secure by design,” continuously testing APIs, and patching vulnerabilities proactively, so attackers won’t even have the 22 minutes they need to find and target the weaknesses. Looking for ways to simplify your team’s AI security posture? FireTail can help. Set up a demo or start your free trial today.
The post The Sequential Kill Chain for AI – FireTail Blog appeared first on Security Boulevard.