[00:00] Chad Thompson: I'm Erin Cole. We are opening today with a massive shift in the global risk landscape. [00:05] Chad Thompson: For the second year in a row, G7 nations have officially ranked cyber attacks as their number [00:10] Chad Thompson: one national security concern. Joining us today is Chad Thompson, who brings a systems-level [00:17] Chad Thompson: perspective on AI and security, blending technical depth with insights from engineering and [00:22] Chad Thompson: music production. Chad, great to have you. I'm Lauren Mitchell. [00:26] Aaron Cole: It really is a watershed moment, Aaron. [00:29] Aaron Cole: According to the Munich Security Index released at the Munich Security Conference, [00:33] Aaron Cole: cyber threats have completely displaced economic and financial crises as the primary concern. [00:39] Aaron Cole: Germany, the UK, and Japan are leading the sentiment, with up to 75% of respondents identifying cyber risk as their most serious national vulnerability. [00:51] Chad Thompson: The urgency isn't just theoretical, Lauren. We're seeing it on the front lines. [00:56] Chad Thompson: On Friday, Google was forced to release emergency updates for the first Chrome Zero Day of 2026 – [01:03] Chad Thompson: This high-severity flaw, CVE-2026-2441, is a use-after-free bug in CSS that's already being exploited in the wild. [01:13] Chad Thompson: If you're running Chrome or any Chromium browser like Edge or Brave, you need to relaunch an update immediately. [01:22] Aaron Cole: And it's not just browsers. [01:23] Aaron Cole: BeyondTrust also issued a warning this week about a critical pre-authentication RCE flaw in the remote support and privileged remote access software. [01:33] Aaron Cole: Tracked as CVE 2026 to 1731, this vulnerability allows unauthenticated attackers to execute commands just by sending a crafted request. [01:45] Aaron Cole: With over 8,500 on-prem deployments potentially exposed, the risk of system compromise is incredibly high. [01:52] Lauren Mitchell: It's a classic engineering problem of trusted access points being turned into entry points. [01:58] Lauren Mitchell: What's striking here, Aaron, is the human element behind these exploits. [02:04] Lauren Mitchell: Look at the L3 Harris case from last week. [02:07] Lauren Mitchell: A former general manager of their cyber subsidiary, Peter Williams, [02:11] Lauren Mitchell: was just detailed in a DOJ filing for selling eight zero-day kits to a Russian broker. [02:18] Lauren Mitchell: That's a $35 million loss to his employer, but the damage to national security is immeasurable. [02:25] Chad Thompson: That's notable. That betrayal of trust by Williams underscores why the G7 is so rattled. [02:32] Chad Thompson: These tools were used by Russian clients against both civilian and military targets. [02:38] Chad Thompson: Meanwhile, the technology we're relying on to defend these networks, specifically AI, might be hitting a ceiling. [02:45] Aaron Cole: Exactly, Aaron. New research released today suggests we're facing an AI security plateau. [02:52] Aaron Cole: While models like Claude and Gemini are getting better at generating functional code, [02:59] Aaron Cole: they only produce secure code about 55% of the time. [03:05] Aaron Cole: We're seeing detectable OWASP vulnerabilities in nearly half of all AI-generated tasks. [03:12] Aaron Cole: Even with scaling, that security needle isn't moving as fast as the functionality. [03:18] Lauren Mitchell: That's the vibe coding trap, Lauren. [03:21] Lauren Mitchell: From a systems perspective, if we don't explicitly teach models to reason about security trade-offs, [03:27] Lauren Mitchell: they'll keep pulling insecure patterns from their training data. [03:32] Lauren Mitchell: We're seeing this play out with the new Rusty Rocket malware integrated into WorldLeaks ransomware. [03:38] Lauren Mitchell: It uses pre-encrypted configurations to bypass traditional defenses. [03:43] Lauren Mitchell: If our AI defenders are stuck at a 55% success rate, these sophisticated payloads will keep [03:50] Lauren Mitchell: finding gaps. [03:52] Chad Thompson: We've covered a lot of ground today from global risk shifts to the granular flaws in [03:57] Chad Thompson: our browsers and defense contractors. [03:59] Chad Thompson: It's clear that the top concern ranking from the G7 isn't an overstatement. [04:05] Chad Thompson: It's a reflection of a high-velocity threat environment that shows no signs of slowing down in 2026. [04:12] Aaron Cole: I'm Lauren Mitchell. [04:13] Aaron Cole: Stay updated, patch your systems, and we'll see you in the next briefing. [04:18] Chad Thompson: And I'm Aaron Cole. [04:20] Chad Thompson: For more analysis, check out pci.neuralnewscast.com. [04:25] Chad Thompson: Thanks for listening to Prime Cyber Insights. [04:28] Chad Thompson: Neural Newscast is AI-assisted, human-reviewed. [04:32] Chad Thompson: View our AI Transparency Policy at neuralnewscast.com.