Related: LLMs fuel automated attacks
According to Straiker CEO Ankur Shah, this shift is happening faster than cloud adoption ever did.
In a Fireside Chat at Black Hat 2025, Shah sketched the architecture of the AI-native stack: a reasoning model such as OpenAI’s GPT or Anthropic’s Claude, tool integrations via emerging standards like the Model Context Protocol, and unfettered access to enterprise datasets.
The payoff is unprecedented automation. The trade-off is a different kind of vulnerability altogether. The weak points now sit inside language models, tool connections, and the data they touch — places older defenses were never designed to watch.
As Shah described this approach, it dawned on me that penetration testing come full circle — except now it’s continuous, automated, and embedded into operations.
The urgency, he argues, is non-negotiable. “All the attacks that have happened in cyber will look like nothing in the AI-native world,” he said.
In an environment where an innocuous-looking document can trigger a cascade of harmful agent actions, Shah’s counsel to CISOs is blunt: embrace AI to compete, but implement continuous red teaming and runtime guardrails now — or risk facing an Armageddon-level breach.
Give a listen to the accompanying podcast.
Acohido
Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.
(LW provides consulting services to the vendors we cover.)
The post BLACK HAT FIRESIDE CHAT: Straiker extends ‘red teaming’ to the AI layer as AI attacks surge first appeared on The Last Watchdog.
This is a CSS-only tabs component that creates animated hash-link navigation for small content panels…
Remcos RAT is being delivered in a new phishing campaign that abuses Google Cloud Storage…
Trusted WordPress plugins from the Essential Plugin portfolio have been quietly weaponized in a delayed…
Oasis Security researchers have uncovered a highly coordinated cyber campaign that scanned more than 12,000…
FUNNULL-linked infrastructure used by the Triad Nexus scam syndicate has re-emerged at scale, with researchers…
Microsoft has urgently released a security update to address a zero-day vulnerability affecting its SharePoint…
This website uses cookies.