<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Blog</title>
	<atom:link href="https://www.imperva.com/blog/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.imperva.com/blog/</link>
	<description>Imperva Cybersecurity Blog</description>
	<lastBuildDate>Thu, 23 Apr 2026 21:37:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://www.imperva.com/wp-content/themes/impv/icons/favicon-32.png</url>
	<title>Blog</title>
	<link>https://www.imperva.com/blog/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Hacking Safari with GPT 5.4 </title>
		<link>https://www.imperva.com/blog/hacking-safari-with-gpt-5-4/</link>
					<comments>https://www.imperva.com/blog/hacking-safari-with-gpt-5-4/#respond</comments>
		
		<dc:creator><![CDATA[Ron Masas]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 18:58:54 +0000</pubDate>
				<category><![CDATA[Imperva Threat Research]]></category>
		<guid isPermaLink="false">https://www.imperva.com/blog/?p=20832</guid>

					<description><![CDATA[<p>When Anthropic unveiled Mythos and Project Glasswing, the reaction was immediate and polarized. Some dismissed it as fear-driven marketing, while others treated it as a credible shift in the threat landscape. Like with many things, the truth is probably somewhere in the middle. I wanted to test that for myself, and since I recently got [&#8230;]</p>
<p>The post <a href="https://www.imperva.com/blog/hacking-safari-with-gpt-5-4/">Hacking Safari with GPT 5.4 </a> appeared first on <a href="https://www.imperva.com/blog">Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>When Anthropic unveiled Mythos and Project Glasswing, the reaction was immediate and polarized. Some dismissed it as fear-driven marketing, while others treated it as a credible shift in the threat landscape.</p>
<p>Like with many things, the truth is probably somewhere in the middle. I wanted to test that for myself, and since I recently got access to OpenAI’s Trusted Access for Cyber program, I decided to take it for a spin.</p>
<p>GPT-5.4 identified the bugs and helped assemble a working exploit chain, but it wasn’t a simple “build me an exploit” prompt. Guiding it required domain knowledge, iterative probing, and knowing which paths were actually exploitable.</p>
<p>On modern browsers like Safari, exploitation is less about finding bugs and more about finding bugs that still matter after multiple layers of defense.</p>
<p>The bug I&#8217;m going to talk about today sits in a more interesting category. The bug itself looked contained, and in many ways it was. It did not provide a path to RCE or a sandbox escape. What it did instead was cross a different boundary entirely: it broke the Same-Origin Policy.</p>
<p>If you visited a malicious page from any Apple device, it could read authenticated cross-origin data from other sites you use, including access tokens and other sensitive data, making account takeover trivial.</p>
<p>The video below shows the PoC we sent Apple, demonstrating leakage of sensitive data from both Apple Connect and iCloud / Apple ID endpoints. Although this demo focuses on Apple services, the issue affects all websites. This means that by visiting a malicious website, sensitive data from other domains is at risk of being leaked.</p>
<p><div style="width: 1832px;" class="wp-video"><video class="wp-video-shortcode" id="video-20832-1" width="1832" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/safariexploit.mp4?_=1" /><a href="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/safariexploit.mp4">https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/safariexploit.mp4</a></video></div><br />
</br></p>
<h3>The Sandbox Russian Doll</h3>
<p>Browser exploitation in 2026 is a lot like being trapped in a Russian doll.</p>
<p>You start in the smallest doll, and every time you escape one layer you discover you are still trapped inside another one.</p>
<p>Finding a low-level memory bug is not the same thing as finding an exploit. Most of these bugs die in the gap between &#8220;memory corruption happened&#8221; and &#8220;something meaningful crossed a security boundary.&#8221;</p>
<p>On the outside you have the browser process model. Even if renderer code goes wrong, the browser is trying very hard to keep that damage inside the web content process.</p>
<p><img data-src="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/infographic.png" alt="infographic" width="610" height="610" class="lazyload aligncenter size-full wp-image-20848 lazyload" srcset="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/infographic.png 610w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/infographic-300x300.png 300w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/infographic-150x150.png 150w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/infographic-36x36.png 36w" sizes="(max-width: 610px) 100vw, 610px" /></p>
<p>Inside that you have the web security model: Same-Origin Policy, CORS, opaque responses, cookie scoping, and credential modes. Even if a page can trigger a cross-origin request, the renderer, and especially the <a href="https://phakeobj.netlify.app/posts/gigacage/" target="_blank">Gigacage</a>, should not be able to access the response bytes. Right?&#8230;</p>
<h3>The Bug</h3>
<p>The original bug lives in the refresh logic for non-shared resizable WebAssembly memory.</p>
<p>When a non-shared WebAssembly.Memory grows in BoundsChecking mode, JavaScriptCore can replace the underlying memory handle. That part is not the bug. The bug is what happens after that to the JS-visible resizable buffer returned by memory.toResizableBuffer().</p>
<p><img data-src="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/diagram.png" alt="diagram" width="936" height="520" class="lazyload aligncenter size-full wp-image-20850 lazyload" srcset="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/diagram.png 936w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/diagram-300x167.png 300w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/diagram-768x427.png 768w" sizes="(max-width: 936px) 100vw, 936px" /></p>
<p>The bug is simple enough that once I saw it, it was hard to unsee it. Safari&#8217;s grow path effectively does this:</p>
<p><img data-src="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code1.png" alt="code1" width="936" height="206" class="lazyload aligncenter size-full wp-image-20851 lazyload" srcset="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code1.png 936w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code1-300x66.png 300w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code1-768x169.png 768w" sizes="(max-width: 936px) 100vw, 936px" /></p>
<p>And the refresh step effectively does this:</p>
<p><img data-src="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code2.png" alt="code2" width="936" height="238" class="lazyload aligncenter size-full wp-image-20852 lazyload" srcset="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code2.png 936w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code2-300x76.png 300w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code2-768x195.png 768w" sizes="(max-width: 936px) 100vw, 936px" /></p>
<p>After memory.grow(), WebKit updates the buffer metadata, but leaves m_data pointing at the old freed allocation.</p>
<p>So after a grow, JavaScript can hold a buffer whose reported size is new, whose handle is new, but whose actual data pointer still references the old freed Primitive Gigacage allocation.</p>
<p>That turns into a stale typed-array window over freed memory.</p>
<p>On its own, this is already a real bug. But we’re still stuck inside the JavaScriptCore gigacage, effectively sandboxed. Without a second bug to break out into the renderer, it doesn’t chain into anything meaningful. What we have is a solid first-stage primitive, but no real security impact on its own.</p>
<h3>Why it did not look exploitable at first</h3>
<p>The stale window is confined to the Primitive Gigacage, which immediately limits what you can do with it. Many typical targets either never land there, lack useful structure, or fail to produce any cross-boundary effect.</p>
<p>So early on, it had all the hallmarks of a bug that looks promising but rarely goes the distance:</p>
<ul>
<li>easy source-level root cause  </li>
<li>visible stale memory behavior  </li>
<li>real reclaim  </li>
<li>no clean escape path  </li>
</ul>
<p>This is where a lot of low-level browser bugs die.</p>
<p>What changed the problem was a very different framing: maybe I did not need to escape the cage at all.</p>
<p>Maybe I just needed the browser to place something valuable inside it.</p>
<h3>The Pivot</h3>
<p>Instead of asking “how do I get from my stale WASM view to some protected browser state?” I started asking a better question:</p>
<p>“What browser code takes data that JavaScript is not allowed to read, but still copies that data into normal renderer memory?”</p>
<p>Because that is all I need.</p>
<p>I don’t need to break the abstraction.</p>
<p>I just need the browser to break it for me.</p>
<p>That naturally narrows the search space to subsystems that:</p>
<ul>
<li>handle sensitive cross-origin data, and  </li>
<li>still allocate ArrayBuffer-backed memory as part of their internal pipeline  </li>
</ul>
<p>That points straight at Fetch. The <a href="https://developer.mozilla.org/en-US/docs/Web/API/Fetch_API/Using_Fetch" target="_blank">Fetch API</a> clearly indicates that the response is opaque, meaning that its headers and body are not available to JavaScript.</p>
<p><strong>Opaque Responses Are Supposed to Be Opaque</strong></p>
<p>At the API level, the Fetch model here is straightforward.</p>
<p>If I do a cross-origin request with:</p>
<p>fetch(url, { mode: &#8220;no-cors&#8221;, credentials: &#8220;include&#8221; });</p>
<p>The browser may send the request, including cookies depending on context, but JavaScript receives an opaque response.</p>
<p>That means:</p>
<ul>
<li>I can hold the Response object  </li>
<li>but I cannot read the body bytes  </li>
</ul>
<p>And WebKit enforces that in the obvious place:</p>
<p>FetchBodyOwner::readableStream() blocks opaque bodies via isBodyNullOrOpaque().</p>
<p>So at first glance, everything looks fine. The body is hidden. The policy is enforced. Same-Origin Policy survives another day.</p>
<p>Except it does not.</p>
<h3>The Fetch Behavior that Broke the Modal</h3>
<p>The surprising part is Response.clone().</p>
<p>If FetchResponse::clone() is called while the response is still loading, WebKit will internally create a readable stream so it can tee the body between the original response and the clone.</p>
<p>That internal path does not apply the same opaque-body check first.</p>
<p>And once that happens, hidden response bytes start becoming very real renderer objects.</p>
<p>This is the part that made me stop and stare at the source, because the mismatch is right there.</p>
<p>The normal body path blocks opaque responses:</p>
<p><img data-src="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code3.png" alt="code3" width="936" height="376" class="lazyload aligncenter size-full wp-image-20854 lazyload" srcset="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code3.png 936w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code3-300x121.png 300w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code3-768x309.png 768w" sizes="(max-width: 936px) 100vw, 936px" /></p>
<p>But FetchResponse::clone() does this while the response is still loading:</p>
<p><img data-src="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code4.png" alt="code4" width="936" height="456" class="lazyload aligncenter size-full wp-image-20855 lazyload" srcset="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code4.png 936w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code4-300x146.png 300w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code4-768x374.png 768w" sizes="(max-width: 936px) 100vw, 936px" /></p>
<p>That is why it works.</p>
<p>The visible accessor path says &#8220;opaque bodies do not get a stream.&#8221; The clone path says &#8220;if it is still loading, create a stream so both clones can tee it.&#8221;</p>
<p>That second path is exactly what I needed.</p>
<p>The data flows through normal ArrayBuffer creation paths:</p>
<ul>
<li>buffered chunks go through tryCreateArrayBuffer()  </li>
<li>later chunks go through takeAsArrayBuffer()  </li>
<li>shared buffer data gets copied into ordinary ArrayBuffer allocations inside the renderer  </li>
</ul>
<p>So the policy ends up split in two:</p>
<ul>
<li>the public Fetch API says the body is opaque  </li>
<li>the renderer still materializes the opaque body into readable byte arrays during clone-time streaming </li>
</ul>
<p>Combined with the stale WASM window, it becomes a SOP break.</p>
<h3>The Chain</h3>
<p>At a high level, the exploit became:</p>
<ol>
<li>Force the target WASM memory into the BoundsChecking path.  </li>
<li>Call memory.toResizableBuffer().  </li>
<li>Grow the memory.  </li>
<li>Keep the stale resizable buffer whose pointer still targets freed Primitive Gigacage pages.  </li>
<li>Trigger a cross-origin fetch(&#8230;, { mode: &#8220;no-cors&#8221;, credentials: &#8220;include&#8221; }).  </li>
<li>Call response.clone() while the response is still loading.  </li>
<li>Let Fetch internals materialize the hidden body bytes into ordinary renderer ArrayBuffers.  </li>
<li>Reclaim the stale WASM-covered pages with those allocations.  </li>
<li>Read the cross-origin bytes through the stale view.  </li>
</ol>
<p>That is the entire trick.</p>
<p>I never needed response.text(). I never needed response.arrayBuffer(). I never needed the public API to hand me the body.</p>
<p>The browser copied the body into memory for its own internal bookkeeping, and the stale WASM view read it directly.</p>
<p>That is why this bug stopped being &#8220;some weird WASM UAF&#8221; and became &#8220;this completely breaks the Same-Origin Policy.&#8221;</p>
<p>The file:// Detour</p>
<p>One of the weirdest parts of the research was that the request side behaved differently depending on where I launched it from.</p>
<p>In my testing, cross-origin requests were much easier to get moving from file:// than from a normal https attacker page.</p>
<p>That sounds backwards until you look at WebKit&#8217;s handling of local origins.</p>
<p>Document.cpp has explicit special-casing around local documents and settings like:</p>
<ul>
<li>allowUniversalAccessFromFileURLs  </li>
<li>allowFileAccessFromFileURLs  </li>
</ul>
<p>MiniBrowser exposes those knobs too, which made file:// very useful as a research environment. It let me focus on the memory side and confirm the leak path before I had a clean web-facing story.</p>
<p>But I did not want a local-file party trick.</p>
<p>I wanted a real web exploit.</p>
<p>And from a normal https page, the same request pattern was not giving me the reliability I wanted.</p>
<p>That is where about:blank saved me.</p>
<h3>Why about:blank saved the final POC</h3>
<p>The final PoC opens an about:blank popup and performs the fetches from there:</p>
<p><img data-src="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code5.png" alt="code5" width="936" height="326" class="lazyload aligncenter size-full wp-image-20856 lazyload" srcset="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code5.png 936w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code5-300x104.png 300w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code5-768x267.png 768w" sizes="(max-width: 936px) 100vw, 936px" /></p>
<p>This ended up mattering a lot.</p>
<p>At first I thought this was just an origin-inheritance trick. That part is real:</p>
<p><img data-src="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code6.png" alt="code6" width="936" height="178" class="lazyload aligncenter size-full wp-image-20857 lazyload" srcset="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code6.png 936w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code6-300x57.png 300w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code6-768x146.png 768w" sizes="(max-width: 936px) 100vw, 936px" /></p>
<p>So about:blank does inherit the opener&#8217;s origin.</p>
<p>But that alone does not explain why the popup path behaved differently.</p>
<p>What actually seems to matter is Safari&#8217;s cookie / first-party bookkeeping. Fetch subresource requests copy document->firstPartyForCookies() into the request:</p>
<p><img data-src="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code7.png" alt="code7" width="936" height="94" class="lazyload aligncenter size-full wp-image-20858 lazyload" srcset="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code7.png 936w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code7-300x30.png 300w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code7-768x77.png 768w" sizes="(max-width: 936px) 100vw, 936px" /></p>
<p>And WebKit&#8217;s cookie blocking logic bails out immediately if that first-party domain is empty:</p>
<p><img data-src="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code8.png" alt="code8" width="936" height="168" class="lazyload aligncenter size-full wp-image-20859 lazyload" srcset="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code8.png 936w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code8-300x54.png 300w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/code8-768x138.png 768w" sizes="(max-width: 936px) 100vw, 936px" /></p>
<p>That is a very different path from a normal attacker-controlled https page. From a regular https://attacker.example origin, the first party is the attacker site, so a request to the victim site looks third-party and Safari&#8217;s tracking-prevention logic can suppress cookies.</p>
<p>From the about:blank popup path, the security origin still comes from the opener, but the popup&#8217;s top-level URL / first-party context is no longer a normal registrable https site in the same way. In practice, that was enough to make credentials: &#8220;include&#8221; requests behave differently and get me the authenticated traffic pattern I needed.</p>
<p>So the important point is not &#8220;about:blank disabled CORS.&#8221; It did not. The important point is:</p>
<ul>
<li>the popup kept the opener&#8217;s origin  </li>
<li>the request still went through normal Fetch/CORS code  </li>
<li>Safari&#8217;s first-party cookie logic treated that popup context differently </li>
</ul>
<p>That was the difference between &#8220;cross-origin request happens but is useless&#8221; and &#8220;cross-origin request comes back with authenticated bytes worth stealing.&#8221;</p>
<h3>Why this was fun</h3>
<p>This is my favorite kind of browser bug.</p>
<p>Not because the root cause was complicated. It was not. The WASM bug was almost embarrassingly direct.</p>
<p>And not because the final chain was huge. It was not.</p>
<p>It was fun because it is exactly the kind of bug modern browser architecture is supposed to suppress.</p>
<p>A stale pointer inside a cage is supposed to stay a stale pointer inside a cage.</p>
<p>An opaque response is supposed to stay opaque.</p>
<p>Those are both reasonable assumptions.</p>
<p>The exploit works because both assumptions were true only locally.</p>
<p>JavaScriptCore gave me a stale view that looked hard to use. WebCore Fetch gave me sensitive bytes that looked impossible to read.</p>
<p>Put them together and Safari&#8217;s Same-Origin Policy fell apart.</p>
<h3>Disclosure</h3>
<p>We reported our findings to Apple. Shortly after, a fix shipped, suggesting the issue was already known internally.</p>
<p>The vulnerability (CVE-2026-20664) is addressed in iOS 26.4 and iPadOS 26.4 (23E6254 and later), and macOS Tahoe 26.4 (25E253 and later). Make sure your systems are up to date.</p>
<h3>Closing Thoughts</h3>
<p>The biggest thing on my mind after working with these models is the leverage they provide, and what that means for N-days. A security patch in popular software used to hide the underlying exploit behind time, effort, and expertise. Now that you can scale tokens instead of effort, that barrier is mostly gone.</p>
<p>This doesn’t turn exploitation into a trivial task. You still need someone who understands what they are looking at, can filter noise, and can steer the process when it stalls. But AI changes the unit of work. Instead of deep, sequential effort, you get parallel exploration and rapid iteration. The constraint shifts from raw effort to how effectively an operator can guide multiple lines of inquiry at once.<br />
`</p>
<p>The post <a href="https://www.imperva.com/blog/hacking-safari-with-gpt-5-4/">Hacking Safari with GPT 5.4 </a> appeared first on <a href="https://www.imperva.com/blog">Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.imperva.com/blog/hacking-safari-with-gpt-5-4/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<enclosure type="image/jpg" url="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/GPT-5.4.png" length="936" />	</item>
		<item>
		<title>Enterprise-Grade Application Security, Cloud-Native Speed: Introducing Imperva for Google Cloud</title>
		<link>https://www.imperva.com/blog/enterprise-grade-application-security-cloud-native-speed-introducing-imperva-for-google-cloud/</link>
					<comments>https://www.imperva.com/blog/enterprise-grade-application-security-cloud-native-speed-introducing-imperva-for-google-cloud/#respond</comments>
		
		<dc:creator><![CDATA[Ido Mantsur]]></dc:creator>
		<pubDate>Wed, 22 Apr 2026 12:59:25 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cloud-native Security]]></category>
		<guid isPermaLink="false">https://www.imperva.com/blog/?p=20817</guid>

					<description><![CDATA[<p>In today’s dynamic digital environment, the pressure to innovate has never been greater. Development teams are pushing for native cloud tools to maximize performance and cost-efficiency, while security teams require best-of-breed, enterprise-grade protection to defend against an ever-evolving threat landscape. This often creates a point of friction, forcing organizations into a difficult trade-off: sacrifice performance [&#8230;]</p>
<p>The post <a href="https://www.imperva.com/blog/enterprise-grade-application-security-cloud-native-speed-introducing-imperva-for-google-cloud/">Enterprise-Grade Application Security, Cloud-Native Speed: Introducing Imperva for Google Cloud</a> appeared first on <a href="https://www.imperva.com/blog">Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In today’s dynamic digital environment, the pressure to innovate has never been greater. Development teams are pushing for native cloud tools to maximize performance and cost-efficiency, while security teams require best-of-breed, enterprise-grade protection to defend against an ever-evolving threat landscape. This often creates a point of friction, forcing organizations into a difficult trade-off: sacrifice performance for security, or accept weaker protections for the sake of speed.</p>
<p>To resolve this challenge, Thales Imperva is collaborating with Google Cloud to deliver a solution that helps bridge this gap. We are proud to introduce Imperva for Google Cloud (IGC), an integrated security solution that offers the best of both worlds: enterprise-grade application security with the cloud-native performance you expect from Google Cloud.</p>
<h2><strong>Imperva for Google Cloud: A Holistic, Integrated Solution</strong></h2>
<p>Imperva for Google Cloud is not just another security layer; it is a fully managed, best-in-class Web Application and API Protection (WAAP) solution built directly into the fabric of Google Cloud. This integration, available now on Google Cloud Marketplace,   provides robust protection without disrupting your existing infrastructure or workflows.</p>
<ul>
<li><strong>Cloud-Native Performance Without Compromise:</strong> Imperva for Google Cloud uses Google Cloud&#8217;s native Service Extension and Private Service Connect to inspect traffic within the Google Cloud network. This means all traffic analysis happens without your data ever leaving Google Cloud infrastructure, preserving optimal latency, performance, and data residency.</li>
<li><strong>Quick Deployment:</strong> Forget complex re-architecture. Imperva for Google Cloud can be deployed quickly using familiar tools like Terraform, Google Cloud CLI (gCloud CLI), or the Google Cloud console UI. There are no disruptive DNS, SSL, or network routing changes required, allowing you to achieve production-ready protection almost immediately.</li>
<li><strong>Enterprise-Grade Protection Out of the Box:</strong> Imperva for Google Cloud is powered by Imperva’s industry-leading security engine, delivering comprehensive WAF, advanced API Security, and Account Bot Protection. Backed by 24/7 threat research, the Imperva solution provides near-zero false positives, with 97% of customers successfully using default policies and 95% running in blocking mode from day one. This dramatically reduces the operational overhead of constant rule tuning.</li>
</ul>
<h2><strong>Real-World Impact: Securely Accelerating Your Business</strong></h2>
<p>By eliminating the trade-offs between security and performance, Imperva for Google Cloud helps organizations achieve key business outcomes:</p>
<ul>
<li><strong>Accelerate Lift-and-Shift Migrations:</strong> Migrate workloads to Google Cloud confidently with security that adapts to your applications, not the other way around. Eliminate migration delays caused by complex security re-architecture.</li>
<li><strong>Unleash DevOps-Friendly Security:</strong> Empower development teams to innovate at speed. IGC closes the security gaps in built-in tools without slowing down deployment velocity or requiring developers to become security experts.</li>
<li><strong>Protect Modern Cloud-Native Applications:</strong> Secure your Kubernetes and microservices architectures with best-in-class defenses optimized for low-latency environments.</li>
<li><strong>Achieve Unified Multi-Cloud Governance:</strong> Manage security for all your Imperva-protected environments from a single, unified dashboard, providing consistent policy management and visibility across your entire multi-cloud estate.</li>
</ul>
<p><em>“Bringing Thales Imperva to Google Cloud Marketplace will help customers quickly deploy, manage, and grow the company’s integrated security solution on Google Cloud’s trusted, global infrastructure,” said Dai Vu, Managing Director, Marketplace &amp; ISV GTM Programs at Google Cloud. “Thales can now securely scale and support organizations that want to use its Imperva for Google Cloud solution to increase protection for their cloud-native applications, APIs, microservices and more.”</em></p>
<h2><strong>Join Us on the Journey to More Seamless Cloud Security</strong></h2>
<p>As we approach key industry events like our exclusive Executive Briefing Center (EBC) meeting in late March and Google Cloud Next 2026 in April, the conversation around integrated  security has never been more relevant. The launch of Imperva for Google Cloud marks a pivotal moment in our relationship with Google, providing a clear path for customers to secure their digital assets without compromise.</p>
<p><strong>Ready to secure your cloud-native applications?</strong></p>
<ul>
<li><strong>Request a demo</strong>: Experience IGC in action at <a href="https://www.imperva.com/products/imperva-for-google-cloud/">Imperva for Google Cloud</a></li>
<li><strong>Start your evaluation</strong>: Available now on <a href="https://console.cloud.google.com/marketplace/product/cpl-vpop-p-mktp-global-02/ias4gc?project=workflow-test-474814&amp;pli=1&amp;login=true&amp;ref=https:%2F%2Fstatics.teams.cdn.office.net%2F" target="_blank" rel="noopener">Google Cloud Marketplace</a></li>
</ul>
<p>The post <a href="https://www.imperva.com/blog/enterprise-grade-application-security-cloud-native-speed-introducing-imperva-for-google-cloud/">Enterprise-Grade Application Security, Cloud-Native Speed: Introducing Imperva for Google Cloud</a> appeared first on <a href="https://www.imperva.com/blog">Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.imperva.com/blog/enterprise-grade-application-security-cloud-native-speed-introducing-imperva-for-google-cloud/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<enclosure type="image/jpg" url="https://www.imperva.com/blog/wp-content/uploads/sites/9/2024/08/skyscraper-in-the-clouds.jpg" length="845" />	</item>
		<item>
		<title>Anthropic Mythos: Separating Signal from Hype</title>
		<link>https://www.imperva.com/blog/anthropic-mythos-separating-signal-from-hype/</link>
					<comments>https://www.imperva.com/blog/anthropic-mythos-separating-signal-from-hype/#respond</comments>
		
		<dc:creator><![CDATA[Nadav Avital]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 17:43:27 +0000</pubDate>
				<category><![CDATA[Imperva Threat Research]]></category>
		<guid isPermaLink="false">https://www.imperva.com/blog/?p=20808</guid>

					<description><![CDATA[<p>The recent buzz around Anthropic’s Mythos model has been intense, and for good reason. Early reports suggest a model that significantly advances automated reasoning over large codebases, vulnerability discovery, and exploit generation. Some are already calling it a “game changer” for offensive security.  But like most breakthroughs in AI, the reality is more nuanced.  Let’s unpack what Mythos is, [&#8230;]</p>
<p>The post <a href="https://www.imperva.com/blog/anthropic-mythos-separating-signal-from-hype/">Anthropic Mythos: Separating Signal from Hype</a> appeared first on <a href="https://www.imperva.com/blog">Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-contrast="auto">The recent buzz around Anthropic’s </span><i><span data-contrast="auto">Mythos</span></i><span data-contrast="auto"> model has been intense, and for good reason. Early reports suggest a model that significantly advances automated reasoning over large codebases, vulnerability discovery, and exploit generation. Some are already calling it a “game changer” for offensive security.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">But like most breakthroughs in AI, the reality is more nuanced.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">Let’s unpack what Mythos is, why it’s getting so much attention, and where the real impact will (and won’t) be.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<h2><b><span data-contrast="none">What Is Mythos, and Why It Matters</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h2>
<p><span data-contrast="auto">At its core, Mythos is designed to operate deeply within software systems:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">It can reason across </span><b><span data-contrast="auto">entire codebases</span></b><span data-contrast="auto">, not just snippets </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">It demonstrates strong capabilities in </span><b><span data-contrast="auto">multi-step vulnerability discovery</span></b><span data-contrast="auto"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">It can potentially chain findings into </span><b><span data-contrast="auto">realistic exploit paths</span></b><span data-contrast="auto"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p><span data-contrast="auto">This is what sets it apart from earlier models. Traditional LLMs often struggled with:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Context fragmentation (limited memory of large systems) </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Superficial pattern matching (vs. true reasoning) </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Weakness in multi-stage attack logic </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p><span data-contrast="auto">Mythos appears to push beyond that, closer to what human security researchers do when analyzing complex systems.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">That’s the hype. Now let’s put it into perspective.</span></p>
<h2><b><span data-contrast="none">1. Closed Systems Still Have a Natural Advantage</span></b></h2>
<p><span data-contrast="auto">One of the most important constraints, often overlooked, is </span><b><span data-contrast="auto">access</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">Organizations running:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Licensed binaries </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Closed-source products </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">SaaS platforms </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p><span data-contrast="auto">are inherently less exposed to this class of AI-driven analysis.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">Why? Because Mythos appears to be most effective when it has </span><b><span data-contrast="auto">full visibility into the source code</span></b><span data-contrast="auto">. Without that:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Reverse engineering binaries is still </span><b><span data-contrast="auto">hard and lossy</span></b><span data-contrast="auto"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">SaaS environments expose only </span><b><span data-contrast="auto">interfaces, not logic</span></b><span data-contrast="auto"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p><span data-contrast="auto">This creates a </span><b><span data-contrast="auto">natural barrier</span></b><span data-contrast="auto"> for attackers.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">Although “security through obscurity” isn’t a solution, in practice:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Open-source projects and exposed codebases will feel the impact first </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Closed vendors still need to worry, but they’re not suddenly transparent overnight </span></li>
</ul>
<h2><b><span data-contrast="none">2. The Real Pressure Point: Time-to-Mitigation</span></b></h2>
<p><span data-contrast="auto">AI doesn’t just change </span><i><span data-contrast="auto">what</span></i><span data-contrast="auto"> attackers can do, it changes </span><i><span data-contrast="auto">how fast</span></i><span data-contrast="auto"> everything happens. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">And this is where </span><b><span data-contrast="auto">security vendors</span></b><span data-contrast="auto"> feel the most pressure. The challenge isn’t whether vulnerabilities exist, it’s </span><b><span data-contrast="auto">how fast vendors can respond once they’re discovered</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><b><span data-contrast="none">The new race:</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">AI/ human finds vulnerability → </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">AI Exploit is generated quickly → </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Attack traffic emerges earlier → </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Defenses must adapt in near real-time.</span></li>
</ul>
<p><span data-contrast="auto">This shifts the competitive advantage to vendors that can:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Automate security workflows to</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="o" data-font="Courier New" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1440,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="2"><span data-contrast="auto">Rapidly </span><b><span data-contrast="auto">understand new attack patterns </span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="o" data-font="Courier New" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1440,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="2"><b><span data-contrast="auto">Generate mitigations</span></b><span data-contrast="auto"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Deploy protections </span><b><span data-contrast="auto">before mass exploitation</span></b><span data-contrast="auto"> </span></li>
</ul>
<h2><b><span data-contrast="none">3. The Budget Reality: AI Red-Teaming Isn’t Cheap</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h2>
<p><span data-contrast="auto">One of the least discussed aspects of Mythos is </span><b><span data-contrast="auto">cost</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">Running such a model at scale involves:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">High compute costs </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Expensive infrastructure </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="o" data-font="Courier New" data-listid="9" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1440,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="2"><span data-contrast="auto">For example, <a href="https://red.anthropic.com/2026/mythos-preview/" target="_blank" rel="noopener">Anthropic admitted</a> that “Across a thousand runs through our scaffold, the total cost was under $20,000” for finding vulnerabilities in OpenBSD.</span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Significant human validation effort</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p><span data-contrast="auto">And that last part is critical.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><b><span data-contrast="none">Every finding still requires:</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Verification (is it real?) </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Reproduction </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Impact assessment </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p><span data-contrast="auto">Which means <strong>m</strong></span><strong>ore </strong><b><span data-contrast="auto">security engineers per finding, </span></b>n<span data-contrast="auto">ot less.</span></p>
<p><span data-contrast="auto">Organizations will need to start budgeting for:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">AI-assisted red teaming</span></b><span data-contrast="auto"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Dedicated pipelines to process findings </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Integration into SDLC workflows </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p><span data-contrast="auto">This mirrors what we’ve already seen with </span><span data-contrast="auto">GitHub Copilot-style assistants and </span><span data-contrast="auto">AI-based code analysis tools.</span></p>
<p><b><span data-contrast="none">Implication for attackers:</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></p>
<p><span data-contrast="auto">These “doomsday” capabilities are </span><b><span data-contrast="auto">not evenly distributed</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="14" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Well-funded actors (nation-states, top-tier cybercrime groups) → likely adopters </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="14" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Opportunistic attackers → much slower to benefit </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p><span data-contrast="auto">So the threat landscape </span><b><span data-contrast="auto">widens at the top</span></b><span data-contrast="auto">, not uniformly across all attackers.</span></p>
<h2><b><span data-contrast="none">4. Bug Bounty Programs Will Feel the Noise First</span></b></h2>
<p><span data-contrast="auto">One immediate and very practical impact:</span> <b><span data-contrast="auto">bug bounty platforms are about to get noisy.</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">Expect a surge of:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="15" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">AI-generated vulnerability reports </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="15" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Poorly validated findings </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="15" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Duplicates and false positives </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p><span data-contrast="auto">This creates a scaling problem for security teams.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><b><span data-contrast="none">Organizations will need to adapt:</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="16" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Stronger </span><b><span data-contrast="auto">triage filtering mechanisms</span></b><span data-contrast="auto"> (likely AI-driven) </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="16" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Reputation systems for researchers </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="16" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Penalties for repeated false positives </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="16" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Potential </span><b><span data-contrast="auto">adjustments in bounty pricing</span></b><span data-contrast="auto"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p><span data-contrast="auto">Otherwise, teams risk w</span><span data-contrast="auto">asting cycles on low-quality reports and m</span><span data-contrast="auto">issing real vulnerabilities buried in noise. </span><span data-contrast="auto">Ironically, AI will be needed to defend against AI-generated reports.</span></p>
<h2><b><span data-contrast="none">5. Not All Vulnerabilities Are Equal</span></b></h2>
<p><span data-contrast="auto">Another important nuance: </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">Finding a vulnerability ≠ exploiting it at scale.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">Even with Mythos:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="18" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Many findings will be </span><b><span data-contrast="auto">low impact</span></b><span data-contrast="auto"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="18" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Exploitation may require </span><b><span data-contrast="auto">environment specific conditions</span></b><span data-contrast="auto"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="18" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Real-world constraints (auth, rate limits, monitoring) still apply </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p><span data-contrast="auto">This is where traditional security layers still matter:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="19" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">WAF, API protection, Bot protection</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="19" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Identity protection</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="19" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Data protection</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="19" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Threat reputation</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p><span data-contrast="auto">Mythos increases </span><i><span data-contrast="auto">discovery capability</span></i><span data-contrast="auto">, but doesn’t eliminate </span><b><span data-contrast="auto">defense in depth</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<h2><b><span data-contrast="none">Final Thoughts</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h2>
<p><span data-contrast="auto">The Mythos model presents a meaningful step forward. It brings AI closer to acting like a real security researcher, capable of deep reasoning and complex analysis.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">But it’s not a universal “break everything” button.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="22" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Closed systems still provide friction </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="22" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Costs limit widespread misuse </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="22" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Defensive technologies remain highly relevant </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="22" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Operational processes (triage, mitigation) become the real bottleneck </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<p><span data-contrast="auto">The hype focuses on </span><b><span data-contrast="auto">capability</span></b><span data-contrast="auto">. The reality is about </span><b><span data-contrast="auto">constraints and execution</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">And as always in cybersecurity, the winners won’t be those with the best tools, but those who can operationalize speed, from detection to mitigation, at scale.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p>The post <a href="https://www.imperva.com/blog/anthropic-mythos-separating-signal-from-hype/">Anthropic Mythos: Separating Signal from Hype</a> appeared first on <a href="https://www.imperva.com/blog">Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.imperva.com/blog/anthropic-mythos-separating-signal-from-hype/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>React2DoS (CVE-2026-23869): When the Flight Protocol Crashes at Takeoff</title>
		<link>https://www.imperva.com/blog/react2dos-cve-2026-23869-when-the-flight-protocol-crashes-at-takeoff/</link>
					<comments>https://www.imperva.com/blog/react2dos-cve-2026-23869-when-the-flight-protocol-crashes-at-takeoff/#respond</comments>
		
		<dc:creator><![CDATA[Yohann Sillam]]></dc:creator>
		<pubDate>Thu, 09 Apr 2026 14:54:18 +0000</pubDate>
				<category><![CDATA[Imperva Threat Research]]></category>
		<guid isPermaLink="false">https://www.imperva.com/blog/?p=20800</guid>

					<description><![CDATA[<p>Executive Summary In this article, we disclose a new high severity unauthenticated remote denial‑of‑service vulnerability we identified and reported in React Server Components that we’ve dubbed “React2DoS”.  In this blog, we’ll analyze its impact and place it in the broader context of recently found Flight protocol vulnerabilities, especially CVE‑2026‑23864. Introduction We are in a phase [&#8230;]</p>
<p>The post <a href="https://www.imperva.com/blog/react2dos-cve-2026-23869-when-the-flight-protocol-crashes-at-takeoff/">React2DoS (CVE-2026-23869): When the Flight Protocol Crashes at Takeoff</a> appeared first on <a href="https://www.imperva.com/blog">Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><strong>Executive</strong> <strong>Summary</strong></h2>
<p>In this article, we disclose a new high severity unauthenticated remote denial‑of‑service vulnerability we identified and reported in React Server Components that we’ve dubbed “React2DoS”.  In this blog, we’ll analyze its impact and place it in the broader context of recently found Flight protocol vulnerabilities, especially <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23864" target="_blank" rel="noopener">CVE‑2026‑23864</a>.</p>
<h2><strong>Introduction</strong></h2>
<p>We are in a phase of the web where performance and developer experience are no longer trade-offs, they’re expectations. Modern frameworks compete to ship less JavaScript, reduce client-side complexity, and move logic back to the server.</p>
<p>React, as one of the dominant forces in frontend development, has been at the forefront of this evolution. With the introduction of React Server Components (RSC), the ecosystem embraced a new model: components that execute exclusively on the server, access databases and secrets directly, and stream a serialized UI representation to the client.</p>
<p>This architecture promises smaller bundles, cleaner separation of concerns, and more efficient rendering. Instead of hydrating everything on the client, Server Components emit a structured stream that the browser reconstructs locally.</p>
<p>At the heart of this mechanism lies a custom streaming protocol known as <em>Flight</em>. Through Flight, React can serialize complex structures, like arrays, maps, object references, even promises and async boundaries, allowing the server to describe rich UI trees in a compact format.</p>
<p>This is powerful.</p>
<p>But history has shown that when we introduce custom serialization formats and complex parsers, we also introduce risk. The server must deserialize and reconstruct object graphs from client-controlled input. And complex parsing logic has long been fertile ground for vulnerabilities.</p>
<p>In our research we discovered a denial-of-service vulnerability that allows an attacker to impose disproportionate computation to the remote server.</p>
<h2><strong>React2Shell and subsequent DoS vulnerabilities</strong></h2>
<p>Earlier this year, the disclosure of React2Shell caught much of the community off guard, triggering emergency patches and intense scrutiny of the React Server Components architecture, amplified by waves of low-quality AI-generated analysis that blurred the line between verified facts and speculation. This episode also prompted deeper investigations into and led to new discoveries related to the security of the Flight protocol and related parsing mechanisms.</p>
<p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23864" target="_blank" rel="noopener">CVE‑2026‑23864</a> (CVSS 3.1 of 7.5), stood out as a notable example and serves as a useful reference for understanding the mechanics behind the issue we explore in this research.</p>
<p>Among other vectors, this vulnerability concerned the BigInt deserialization path in Flight:</p>
<ul>
<li>$n markers denote BigInt values</li>
<li>No limit was enforced on digit length</li>
</ul>
<p>Therefore, sending a million‑digit BigInt could cause a significant computation cost, and CPU exhaustion. An example payload could look like this:</p>
<pre>0:"$n9999999999...[repeated 1 million times]"</pre>
<p>In our setup, a single query like this could delay the server’s execution by several seconds if the inbound payload reaches the maximum allowed size (1MB with Node.js runtime, 10MB with Edge runtime).</p>
<p>This was the starting point of our research, and we tried to find payload that would trigger a similar, or superior cost to the server. This is exactly what we found, actually more computationally-intensive  by several orders of magnitude.</p>
<h2><strong>React2DoS</strong></h2>
<p>React relies on a mechanism known as the React Flight Protocol to serialize values that are sent to Server Functions.</p>
<p>On the client side, data is transmitted to the server as small pieces (or “chunks”), for example through form submissions:</p>
<pre>payload = {
  "0": (None, '["$1"]'),
  "1": (None, '{"category":"vehicle","model":"$2:modelName"}'),
  "2": (None, '{"modelName":"tesla"}'),
}</pre>
<p>As illustrated above, these chunks can reference one another.</p>
<p>After deserialization on the server, the reconstructed object looks like this:</p>
<pre>{ "category": "vehicle", "model": "tesla" }</pre>
<p>At first, we tried to measure the cost of execution of every <a href="https://github.com/facebook/react/blob/main/packages/react-server/src/ReactFlightReplyServer.js#L1542" target="_blank" rel="noopener">type of reference</a> supported by the Flight protocol. Among them, we looked at two promising ones: $Q and $W, respectively instantiating new Maps and Sets from the client request payload.</p>
<p>The first observation we made was that it was possible to reference the root element in the root element itself (!), which paved the way to recursive expressions:</p>
<pre>“0” : [“$Q0”]</pre>
<p>This, would cause the execution of the following JavaScript expression:</p>
<pre>New Map([null])</pre>
<p>Which makes perfect sense, because at the time of resolution of $Q0, $0 is not known yet.</p>
<p>However, what surprised us, was the fact that the following expression:</p>
<pre>“0” : [“$Q0”, “$Q0” ..., “$Q0”] (x n)</pre>
<p>did trigger the execution of the Map constructor n times!</p>
<p>Indeed, the ReactFlightReplyServer uses a `consumed` attribute to prevent multiple computations of the same reference and prevent abuse. But this mechanism only enters in action when the reference is successfully resolved (see Fig 1).</p>
<p><img class="lazyload alignnone size-full wp-image-20801 lazyload" alt="Screenshot 2026 04 09 at 7.46.50 AM" width="1902" height="330" data-src="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/Screenshot-2026-04-09-at-7.46.50-AM.png" srcset="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/Screenshot-2026-04-09-at-7.46.50-AM.png 1902w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/Screenshot-2026-04-09-at-7.46.50-AM-300x52.png 300w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/Screenshot-2026-04-09-at-7.46.50-AM-1024x178.png 1024w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/Screenshot-2026-04-09-at-7.46.50-AM-768x133.png 768w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/Screenshot-2026-04-09-at-7.46.50-AM-1536x266.png 1536w" sizes="(max-width: 1902px) 100vw, 1902px" /></p>
<p style="text-align: center"><em>Fig. 1: Exception doesn’t prevent recomputation of the same faulty Map </em></p>
<p><span data-contrast="auto">Because the `new Map` expression failed (new Map([null]) is not a valid JavaScript expression), this outcome was not stored anywhere. But surprisingly, the deserialization is not interrupted by this exception!</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">The execution of the expression `new Map ([null])` is pretty cheap, it takes our server around 0.03ms. Virtually instant. But this is neglecting the fact that  a threat actor can insert more than 100,000 instances in a 1MB payload, leading to the cost of several seconds, comparable to the CPU exhaustion issue behind </span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23864" target="_blank" rel="noopener"><span data-contrast="none">CVE‑2026‑23864</span></a><span data-contrast="auto"> and described above.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">Considering this, we submitted a first report to Meta, sharing this POC and demonstrating the impact.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}"> </span></p>
<p><span data-contrast="auto">But soon after, we realized there was a way more impactful payload we could generate by exploiting our original idea. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}"> </span></p>
<p><span data-contrast="auto">Instead of sending a series of “$Q0” that would immediately trigger the exception, we decided to introduce a series of valid map entries at the start of the root entry, to force the Map constructor to iterate over them before triggering the expected exception (see Fig. 2).</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}"> </span></p>
<p><img class="lazyload alignnone size-full wp-image-20802 lazyload" alt="Screenshot 2026 04 09 at 7.47.57 AM" width="1902" height="396" data-src="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/Screenshot-2026-04-09-at-7.47.57-AM.png" srcset="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/Screenshot-2026-04-09-at-7.47.57-AM.png 1902w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/Screenshot-2026-04-09-at-7.47.57-AM-300x62.png 300w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/Screenshot-2026-04-09-at-7.47.57-AM-1024x213.png 1024w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/Screenshot-2026-04-09-at-7.47.57-AM-768x160.png 768w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/Screenshot-2026-04-09-at-7.47.57-AM-1536x320.png 1536w" sizes="(max-width: 1902px) 100vw, 1902px" /></p>
<p style="text-align: center"><em>Fig. 2: Internal recursive resolution of “$0” </em></p>
<p><span data-contrast="auto">By doing so, we achieved a quadratic complexity, and a much more expensive payload ! The optimal number setting is n/2 valid maps and n/2 map references to the 0 object (“$Q0”).</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}"> </span></p>
<h2><b><span data-contrast="none">CVE‑2026‑23864 (CPU exhaustion) vs React2DoS (CVE-2026-23869)</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h2>
<p><span data-contrast="auto">With our new attack vector, the computation could easily last several minutes. Therefore, with only small payloads of tens of kilobytes, it was possible to initiate impactful DoS attacks.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">To give ourselves an idea of the impact of this attack vector, we computed a chart showing the comparison between </span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23864" target="_blank" rel="noopener"><span data-contrast="none">CVE‑2026‑23864</span></a><span data-contrast="auto"> (CPU exhaustion) and React2DoS. The result showed that after only a few kilobytes, React2DoS starts to stand out, and when the payload size reaches hundreds of kilobytes, it is already more powerful by several orders of magnitude (see Fig. 3).</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<p><img class="lazyload alignnone size-full wp-image-20803 lazyload" alt="Screenshot 2026 04 09 at 7.49.09 AM" width="1902" height="1150" data-src="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/Screenshot-2026-04-09-at-7.49.09-AM.png" srcset="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/Screenshot-2026-04-09-at-7.49.09-AM.png 1902w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/Screenshot-2026-04-09-at-7.49.09-AM-300x181.png 300w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/Screenshot-2026-04-09-at-7.49.09-AM-1024x619.png 1024w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/Screenshot-2026-04-09-at-7.49.09-AM-768x464.png 768w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/Screenshot-2026-04-09-at-7.49.09-AM-1536x929.png 1536w" sizes="(max-width: 1902px) 100vw, 1902px" /></p>
<p style="text-align: center"><em>Fig. 3: Comparison React2DoS – CVE‑2026‑23864 </em></p>
<p><span data-contrast="auto">Therefore, with a single request, a threat actor can trigger a computation that will take minutes to handle. By repeating this, complete denial of service can be achieved.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<h2><b><span data-contrast="none">Mitigation</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h2>
<p><span data-contrast="auto">The React team </span><a href="https://github.com/facebook/react/pull/36236/changes/e3325031b204576b8dd60e54eee24738808d4f67" target="_blank" rel="noopener"><span data-contrast="none">fixed this issue </span></a><span data-contrast="auto">via setting the consumed flag before any map/set constructor was called.</span></p>
<p><span data-contrast="auto">The issue affects React Server Components version 19.2.4 and below. We recommend that you update to the latest available version that patches this vulnerability as soon as possible. </span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">If your application already sits behind an Imperva proxy, it is automatically protected against this attack.</span><span data-ccp-props="{}"> </span></p>
<h2><b><span data-contrast="none">Conclusion</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h2>
<p><span data-contrast="auto">This case highlights an important reality: the path to innovation inevitably introduces complexity, and therefore risk. As ecosystems evolve rapidly, staying up to date and remaining aware of newly discovered security issues is essential.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">In a more personal way, it was a pleasure for me to delve into one of the most used framework in the world and discover a finding with meaningful impact. This wouldn’t have been possible if researchers before didn’t pave the way with their investigations and their recent findings (React2Shell,  </span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23864" target="_blank" rel="noopener"><span data-contrast="none">CVE‑2026‑23864</span></a><span data-contrast="auto">&#8230;). </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<h2><b><span data-contrast="none">Disclosure Timeline</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h2>
<p><span data-contrast="auto">Feb 3 2026 – Report including first payload</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Feb 5 2026 – Second payload reported</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">April 8 2029 – Vulnerability fixed in 19.2.5</span><span data-ccp-props="{}"> (<a href="https://github.com/facebook/react/security/advisories/GHSA-479c-33wc-g2pg" target="_blank" rel="noopener">patch backported to versions 19.0.5, 19.1.6</a>)</span></p>
<p>The post <a href="https://www.imperva.com/blog/react2dos-cve-2026-23869-when-the-flight-protocol-crashes-at-takeoff/">React2DoS (CVE-2026-23869): When the Flight Protocol Crashes at Takeoff</a> appeared first on <a href="https://www.imperva.com/blog">Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.imperva.com/blog/react2dos-cve-2026-23869-when-the-flight-protocol-crashes-at-takeoff/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<enclosure type="image/jpg" url="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/qu8kX.jpg" length="1360" />	</item>
		<item>
		<title>Why AI Bot Protection and Control Are Essential for Application Security</title>
		<link>https://www.imperva.com/blog/why-ai-bot-protection-and-control-are-essential-for-application-security/</link>
					<comments>https://www.imperva.com/blog/why-ai-bot-protection-and-control-are-essential-for-application-security/#respond</comments>
		
		<dc:creator><![CDATA[Grainne McKeever]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 22:29:13 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<guid isPermaLink="false">https://www.imperva.com/blog/?p=20790</guid>

					<description><![CDATA[<p>AI-driven automation is no longer emerging. It is already integrated and accepted as internet traffic. From AI assistants and crawlers to enterprise automation tools, websites are now routinely accessed by non-human actors operating at scale.  Vulnerabilities or weaknesses in your application infrastructure, including risky APIs, are no longer difficult to find, as agentic AI tools, [&#8230;]</p>
<p>The post <a href="https://www.imperva.com/blog/why-ai-bot-protection-and-control-are-essential-for-application-security/">Why AI Bot Protection and Control Are Essential for Application Security</a> appeared first on <a href="https://www.imperva.com/blog">Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>AI-driven automation is no longer emerging. It is already integrated and accepted as internet traffic. From AI assistants and crawlers to enterprise automation tools, websites are now routinely accessed by non-human actors operating at scale.  Vulnerabilities or weaknesses in your application infrastructure, including <a href="https://www.imperva.com/blog/api-security-for-ai-agents-why-protection-has-never-been-more-important/">risky APIs</a>, are no longer difficult to find, as agentic AI tools, paired with automation, can observe and test endpoints and access points faster than any human.</p>
<p>AI-aware bot protection is a security approach that detects, classifies, and controls automated traffic generated by AI agents, LLM-powered assistants, and autonomous tools — then applies granular policies based on each bot&#8217;s identity, intent, and behavior.</p>
<p><strong>Key Takeaways:</strong></p>
<ul>
<li>AI-powered bots now represent a significant and growing share of internet traffic, blending seamlessly into legitimate user sessions.</li>
<li>Traditional bot detection cannot reliably distinguish between beneficial AI assistants and malicious AI-driven agents.</li>
<li>Unmanaged AI bots create measurable business risks: analytics distortion, inventory manipulation, API abuse, account takeover, and content scraping.</li>
<li>Imperva Advanced Bot Protection provides granular visibility and control over AI-driven traffic by tool type, category, behavior, and business function.</li>
<li>Effective AI bot management in 2026 requires multilayered detection with real-time, policy-based response capabilities.</li>
</ul>
<p>The challenge for security teams is no longer understanding <em>why </em>automation is increasing, but gaining clear visibility and control over <em>what</em> that automation is doing.</p>
<p>The result is a growing grey zone where distinguishing among human users, legitimate AI agents, and malicious bots becomes significantly more challenging, and where traditional security controls often lack the visibility needed to reliably distinguish among them.</p>
<p>According to Imperva&#8217;s 2025 Bad Bot Report, bad bots accounted for 32% of all internet traffic — a 2% increase year-over-year. With AI-powered tools accelerating automation, this figure is expected to grow significantly in 2026, making bot detection and bot management a critical priority for every organization.</p>
<h2><strong>How Do AI Bots Blend Into Legitimate Web Traffic?</strong></h2>
<p>AI agents and automated tools are improving how people interact with the internet, dramatically enhancing productivity and convenience. For example:</p>
<ul>
<li>AI assistants like ChatGPT, Perplexity AI, and Google Gemini retrieve real-time answers from multiple websites to summarise content or compare products</li>
<li>Travel platforms continuously check flight prices, seat availability, and hotel inventory</li>
<li>E-commerce monitoring tools track pricing, stock levels, and competitor offers across retailers</li>
<li>AI-powered shopping assistants help users find deals or complete purchases faster</li>
<li>Enterprise AI tools query SaaS platforms and APIs to automate workflows like reporting, customer support, and data enrichment</li>
<li>Search and indexing bots extract and index web content to power AI-driven search experiences</li>
</ul>
<p>However, the same technological advancements that enable these positive experiences are also empowering cybercriminals. Automation at scale lowers the barrier for malicious activity, putting malicious bots at a significant advantage when automated traffic is the expected baseline. They can blend seamlessly into legitimate traffic patterns, making detection significantly more challenging.</p>
<h2><strong>What Are the Business Risks of Unmanaged AI Bot Traffic?</strong></h2>
<p>Many organizations still view bot protection as optional. However, with AI agents such as crawler bots and fetch bots, now an accepted part of internet traffic and automation accelerating at scale, bot protection has become a core security requirement. Failing to treat it as such exposes organizations to serious business risks:</p>
<table width="602">
<thead>
<tr>
<td width="201"><strong>Risk Category</strong></td>
<td width="201"><strong>Description</strong></td>
<td width="201"><strong>Business Impact</strong></td>
</tr>
</thead>
<tbody>
<tr>
<td width="201">Analytics Manipulation</td>
<td width="201">AI bots inflate traffic metrics and distort conversion data</td>
<td width="201">Misinformed decisions, wasted ad spend</td>
</tr>
<tr>
<td width="201">Inventory Hoarding</td>
<td width="201">Automated agents reserve or purchase inventory at scale</td>
<td width="201">Revenue loss, customer experience degradation</td>
</tr>
<tr>
<td width="201">API Business Logic Abuse</td>
<td width="201">AI agents exploit API endpoints beyond intended use</td>
<td width="201">Infrastructure costs, data exposure</td>
</tr>
<tr>
<td width="201">Account Takeover (ATO)</td>
<td width="201">AI-powered credential stuffing at scale</td>
<td width="201">Customer trust erosion, regulatory liability</td>
</tr>
<tr>
<td width="201">Data Scraping</td>
<td width="201">AI systems extract proprietary content for training or replication</td>
<td width="201">Competitive disadvantage, IP loss</td>
</tr>
<tr>
<td width="201">Customer Experience</td>
<td width="201">Bot traffic degrades site performance and availability</td>
<td width="201">Reputational damage, increased churn</td>
</tr>
</tbody>
</table>
<h2><strong>How Does Imperva Deliver AI Bot Detection and Control?</strong></h2>
<p>The ability to control which parts of your application functionality are accessible to AI tools is critical to your AI Security Strategy.</p>
<h3><strong>How Does Imperva Provide Visibility Into AI Bot Traffic?</strong></h3>
<p>Imperva Advanced Bot Protection (ABP) offers granular visibility into AI tools, agents, and crawlers, providing a detailed, real-time view of which AI tools are accessing your websites, applications, and API endpoints.</p>
<p><strong>With ABP, security teams can clearly see which</strong> AI tools are hitting their environment, which applications and URLs are being accessed, the volume and frequency of requests, and whether those requests are being allowed, blocked, or challenged</p>
<p>This level of visibility ensures organizations know exactly what is interacting with their digital services and helps identify unintended policy outcomes, such as blocking AI tools they want to allow, or allowing tools they should restrict.</p>
<p><strong>The AI Tools dashboard</strong> provides a centralized view of AI-driven traffic, enabling faster investigation and more informed decision-making.</p>
<p><img data-src="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/The-AI-Tools-dashboard-.png" alt="The AI Tools dashboard" width="902" height="376" class="lazyload aligncenter size-full wp-image-20793 lazyload" srcset="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/The-AI-Tools-dashboard-.png 902w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/The-AI-Tools-dashboard--300x125.png 300w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/04/The-AI-Tools-dashboard--768x320.png 768w" sizes="(max-width: 902px) 100vw, 902px" /></p>
<h3><strong>How Can You Control AI Bots by Tool Type, Category, and Behavior?</strong></h3>
<p>Beyond visibility, Imperva enables precise control over how AI tools interact with your applications.</p>
<p>With ABP, security teams can easily:</p>
<ul>
<li>Allow, block, or rate-limit specific AI tools</li>
<li>Apply policies based on categories such as AI crawlers, AI agents, and AI fetch bots</li>
<li>Quickly adapt policies as new AI tools emerge</li>
</ul>
<p>This allows organizations to move from reactive blocking to intentional control of automated access.</p>
<h3><strong>How Does Imperva Protect Critical Business Functions from AI Bots?</strong></h3>
<p>Imperva ABP also provides granular control at the application and business function levels, allowing organizations to define exactly which parts of their applications AI tools are allowed to access. This ensures that:</p>
<ul>
<li>Approved tools can only reach intended endpoints</li>
<li>Sensitive paths, APIs, or business logic remain protected</li>
<li>Access policies align with business and data governance requirements</li>
</ul>
<p>This ensures AI tools interact with applications in a controlled, predictable, and secure way.</p>
<h2><strong>Why Is Imperva ABP a Leading Bot Management Solution?</strong></h2>
<p>ABP protection against AI builds on an already strong foundation of Advanced Bot Protection, combining multilayered detection, intelligent risk scoring, and real-time controls to accurately distinguish between human, legitimate automation, and malicious bots. With deep visibility, rapid decisioning, and expert support, ABP is already a proven solution for managing sophisticated bot threats. It is now further strengthened by the ability to monitor and control AI-driven traffic precisely.</p>
<table width="602">
<thead>
<tr>
<td width="201"><strong>Capability</strong></td>
<td width="201"><strong>Traditional Bot Detection</strong></td>
<td width="201"><strong>AI-Aware Bot Protection (Imperva ABP)</strong></td>
</tr>
</thead>
<tbody>
<tr>
<td width="201">Detection Method</td>
<td width="201">Signature and rule-based</td>
<td width="201">ML-based behavioral analysis + AI tool fingerprinting</td>
</tr>
<tr>
<td width="201">AI Tool Classification</td>
<td width="201">No distinction between AI tools</td>
<td width="201">Granular classification by tool type, category, and identity</td>
</tr>
<tr>
<td width="201">Granularity of Control</td>
<td width="201">Block or allow all bots</td>
<td width="201">Allow, block, rate-limit, or challenge per AI tool and per endpoint</td>
</tr>
<tr>
<td width="201">Visibility</td>
<td width="201">Limited to known bot signatures</td>
<td width="201">Real-time dashboard of all AI tool activity by type and behavior</td>
</tr>
<tr>
<td width="201">Adaptability</td>
<td width="201">Manual rule updates required</td>
<td width="201">Continuous learning with rapid policy adaptation for new AI tools</td>
</tr>
<tr>
<td width="201">Business Function Protection</td>
<td width="201">URL-level blocking only</td>
<td width="201">Granular control at the application and business function level</td>
</tr>
</tbody>
</table>
<h2>Frequently Asked Questions About AI Bot Protection</h2>
<p><strong>Q: What is AI-aware bot protection?</strong></p>
<p>A: AI-aware bot protection is a security approach that detects, classifies, and controls automated traffic from AI agents, LLM-powered assistants, and autonomous tools. Unlike traditional bot detection that relies on static signatures, AI-aware protection uses behavioral analysis and AI tool fingerprinting to distinguish between beneficial AI assistants, legitimate automation, and malicious bots.</p>
<p><strong>Q: What is the difference between traditional bot detection and AI-aware bot management?</strong></p>
<p>A: Traditional bot detection identifies bots using predefined signatures and rules, treating most automated traffic as either good or bad. AI-aware bot management goes further by classifying AI tools by type, category, and behavior — enabling organizations to allow helpful AI agents while blocking or rate-limiting harmful ones with granular policies.</p>
<p><strong>Q: How do AI agents bypass conventional bot defenses?</strong></p>
<p>A: AI agents can mimic human browsing behavior, rotate IP addresses, solve CAPTCHA, and generate realistic session patterns. Because they operate as legitimate AI tools (such as AI assistants and search crawlers), they often pass through conventional defenses that only look for known malicious signatures.</p>
<p><strong>Q: What business risks do AI bots create?</strong></p>
<p>A: Unmanaged AI bots can distort marketing analytics, hoard inventory, abuse API business logic, perform credential stuffing for account takeover, scrape proprietary data and competitive intelligence, and degrade customer experience through increased site latency.</p>
<p><strong>Q: Can businesses allow some AI bots while blocking others?</strong></p>
<p>A: Yes. Solutions like Imperva Advanced Bot Protection enable granular control, allowing organizations to allow specific AI tools (such as approved search crawlers), rate-limit others (such as AI assistants accessing content), and block malicious AI agents — all at the individual tool, category, or endpoint level.</p>
<p><strong>Q: What is agentic AI, and why does it matter for application security?</strong></p>
<p>A: Agentic AI refers to autonomous AI systems that can independently browse the web, interact with APIs, and complete multi-step tasks without human oversight. These agents can probe for vulnerabilities, test endpoints, and access business functions faster than any human, making agentic AI security a critical concern for organizations.</p>
<h2><strong>Monitor, Control, and Prevent AI-Driven Bot Threats</strong></h2>
<p>Automation is now a permanent and growing part of how the internet operates. The critical challenge is no longer detecting bots alone but understanding and controlling AI-driven interactions at scale.</p>
<p>Organizations need to know exactly which AI tools are accessing their environments, what they are doing, and how to control that access with precision.</p>
<p>Imperva Advanced Bot Protection delivers the visibility, control, and adaptive protection required to operate securely in this new environment.</p>
<p>By enabling organizations to monitor AI agents, control their access at a granular level, and prevent malicious automation from hiding within legitimate traffic, Imperva helps businesses confidently embrace the future of AI-driven digital experiences.</p>
<p>Learn how Imperva Advanced Bot Protection delivers AI-aware bot management for your applications. Explore our <a href="https://www.imperva.com/products/advanced-bot-protection-management/">bot protection solutions</a> or download the latest Imperva Bad Bot Report for the most current data on AI-driven bot threats.</p>
<p>The post <a href="https://www.imperva.com/blog/why-ai-bot-protection-and-control-are-essential-for-application-security/">Why AI Bot Protection and Control Are Essential for Application Security</a> appeared first on <a href="https://www.imperva.com/blog">Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.imperva.com/blog/why-ai-bot-protection-and-control-are-essential-for-application-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<enclosure type="image/jpg" url="https://www.imperva.com/blog/wp-content/uploads/sites/9/2023/09/shutterstock_1071270287-13.jpg" length="845" />	</item>
		<item>
		<title>API Security for AI Agents: Why Protection Has Never Been More Important.</title>
		<link>https://www.imperva.com/blog/api-security-for-ai-agents-why-protection-has-never-been-more-important/</link>
					<comments>https://www.imperva.com/blog/api-security-for-ai-agents-why-protection-has-never-been-more-important/#respond</comments>
		
		<dc:creator><![CDATA[Lebin Cheng]]></dc:creator>
		<pubDate>Tue, 24 Mar 2026 11:11:00 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<guid isPermaLink="false">https://www.imperva.com/blog/?p=20781</guid>

					<description><![CDATA[<p>For years, a lot of risky APIs survived simply because they were hard to find. They weren’t documented. Only a handful of engineers knew the endpoints. And if an attacker wanted to abuse them, they had to spend real time reverse‑engineering traffic and guessing how things worked. That “security by obscurity” was never a security [&#8230;]</p>
<p>The post <a href="https://www.imperva.com/blog/api-security-for-ai-agents-why-protection-has-never-been-more-important/">API Security for AI Agents: Why Protection Has Never Been More Important.</a> appeared first on <a href="https://www.imperva.com/blog">Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>For years, a lot of risky APIs survived simply because they were hard to find. They weren’t documented. Only a handful of engineers knew the endpoints. And if an attacker wanted to abuse them, they had to spend real time reverse‑engineering traffic and guessing how things worked.</p>
<p>That “security by obscurity” was never a security strategy, but it did create friction.</p>
<p>AI removes that friction.</p>
<p>Today, coding assistants and agentic tools can observe patterns in traffic, infer undocumented endpoints, generate proof‑of‑concept exploits, and test thousands of permutations faster than any human. We’ve already seen what happens when exposed APIs meet automation at scale: a <a href="https://www.malwarebytes.com/blog/news/2026/02/hobby-coder-accidentally-creates-vacuum-robot-army" target="_blank">hobbyist was able to gain control of thousands of robot vacuums due to exposed APIs</a> and an over‑privileged token, something that simply wouldn’t have scaled without automation on the attacker side.</p>
<p><strong>The takeaway is straightforward: </strong>if you don’t know where your APIs are, what they expose, and who can talk to them, AI will find those gaps for you, either in the hands of your developers or your attackers.</p>
<h2>Why has API security become critical in the age of AI agents?</h2>
<p>API security is the foundation of protecting applications against automated, AI-driven threats. In the past, attackers relied on manual reverse-engineering to discover undocumented API endpoints. Today, AI agents and coding assistants can autonomously map traffic patterns, infer hidden endpoints, and test thousands of exploit permutations in seconds. Furthermore, AI agents can bypass traditional web application firewalls (WAFs) by executing perfectly formatted, syntactically correct requests that abuse business logic—such as chaining legitimate calls to perform a Broken Object Level Authorization (BOLA) attack. </p>
<p>Because AI agents use APIs as their primary control plane, securing these interfaces is no longer just about preventing data breaches; it is about establishing the necessary guardrails to ensure AI tools operate safely and within their intended scope.</p>
<h2><strong>How AI Agents Change the Threat Model</strong></h2>
<p>AI doesn’t just make attackers faster. It changes what “attack” looks like, because agents can behave like normal users while still doing abnormal things.</p>
<h3><strong>1) Business Logic is the New Frontline</strong></h3>
<p>Traditional API protections &#8211; gateways, WAFs, basic input validation, are good at stopping obviously bad traffic: missing tokens, malformed payloads, suspicious content types.</p>
<p>But agents don’t have to look suspicious. They can follow every syntactic rule and still abuse your business logic.</p>
<p>Imagine an agent that:</p>
<ul>
<li>Uses a valid user token and calmly walks the edges of a pricing API until it discovers discount combinations you never intended to allow.</li>
<li>Chains perfectly legitimate calls to pivot from one customer data to another customer’s data. This effectively executes a Broken Object Level Authorization (BOLA) attack &#8211; a critical vulnerability highlighted in the <strong>OWASP API Security Top 10 &#8211; </strong>without brute‑forcing raw IDs.</li>
</ul>
<p>Nothing in those requests&#8217; screams “attack.” The danger is in the <strong>sequence</strong>, the <strong>intent</strong>, and the <strong>scale, </strong>the exact things many baseline controls don’t reason about.</p>
<h3><strong>2) Agent-Specific Protocols Expand the Attack Surface</strong></h3>
<p>Agents aren’t only calling the same APIs as your mobile app calls. They’re increasingly using agent‑first toolchains and protocols that wrap platforms behind “tool” interfaces, making discovery and invocation easier than ever.</p>
<p>Look at what’s happening across major SaaS ecosystems: new CLIs and frameworks are designed so an agent can discover capabilities, understand schemas, and call dozens of APIs through a single control surface. Under the hood it’s still JSON over HTTP but packaged in protocols and workflows many security tools don’t meaningfully parse or recognize.</p>
<p>If your security stack doesn’t understand what it’s looking at, it can’t apply real policy. It just sees “some JSON” and hopes for the best.</p>
<h2><strong>The Thales Vision: API Security as the AI Agents&#8217; Control Plane</strong></h2>
<p>At Thales, we see API Security evolving into the control plane for AI agents: the place where you get a coherent view of what agents are doing, which APIs they’re touching, and how to govern that behavior, consistently and at scale.</p>
<h3><strong>1) Start with ruthless visibility</strong></h3>
<p>You can’t protect what you can’t see, and AI moves too fast for spreadsheets and tribal knowledge.</p>
<p>We’re focused on:</p>
<ul>
<li><strong>Finding every API:</strong> Discovering shadow, zombie, and newly created APIs across clouds and data centers, then mapping the data they expose and the business functions they support.</li>
<li><strong>Making agent traffic visible:</strong> Identifying traffic that comes from agents and agent toolchains, tying it back to the human or system they’re acting for, and surfacing suspicious patterns early.</li>
</ul>
<p><strong>The goal: </strong>when your CISO asks, “Which agents can touch customer PII today?” you can answer with confidence instead of guesswork.</p>
<h3><strong>2) Speak the same language as AI agents</strong></h3>
<p>We’re extending the API Security engine, so it doesn’t just see “JSON over HTTP ” but understands the agent protocols layered on top, things like MCP (Model Context Protocol) style streams and backend API calls from an agent-oriented CLI.</p>
<p>Once we can parse and normalize that traffic, we can:</p>
<ul>
<li>Apply the same validation and anomaly detection we already use for REST and GraphQL.</li>
<li>Correlate what an agent is doing across back‑end services, rather than treating every request as an isolated event.</li>
</ul>
<p>In practice, that means the security brain becomes protocol‑aware. Whether an action comes from a mobile app, a browser, or an AI agent using a modern toolchain, the same set of eyes is watching.</p>
<h3><strong>3) Put real guardrails around tokens and delegation</strong></h3>
<p>Agents run on delegation. They act on behalf of users and services using tokens, keys, and temporary credentials. When those credentials are over‑privileged or long‑lived, you get “quiet catastrophe” scenarios, like a single token shared among thousands of agents.</p>
<p>We’re building on our existing token visibility to:</p>
<ul>
<li><strong>Score token risk:</strong> Evaluate scope, lifetime, usage patterns, and anomalies like sudden geography changes or volume spikes.</li>
<li><strong>Create policies specifically for agent delegation:</strong> For example, “This support agent’s token can only read billing data for the current customer, up to N requests per hour, and never export full datasets.”</li>
<li><strong>Catch replay and abuse:</strong> Detect when tokens are cloned, reused from odd locations, or used by unexpected agent identities.</li>
</ul>
<p>If an AI agent starts stretching beyond the intent of its access, querying too broadly, too often, or in the wrong context, the platform should be able to flag, throttle, or cut it off in real time.</p>
<h3><strong>4) Defend the messy middle: business logic and BOLA</strong></h3>
<p>Agents follow natural‑language prompts, not carefully designed UI flows. That makes them unusually good at stumbling into the “negative space” of your application: edge paths nobody documented, but your back end still accepts.</p>
<p>Our approach anchors security in behavior and intent:</p>
<ul>
<li>Model sequences of calls as workflows and look for patterns that don’t match real user behavior, for example, moving from one customer account to another without a corresponding permission to change.</li>
<li>Treat BOLA as more than “did you increment an ID,” and start reasoning about what resource the agent is effectively asking for when it requests “all internal reports” or “all projects in the system.”</li>
</ul>
<p>The endgame is business‑level guardrails you can express clearly, and enforce across all agents, regardless of how clever the prompts are.</p>
<h2><strong>Meeting you where you already are</strong></h2>
<p>None of this works if it requires an exotic, parallel deployment just for AI. That’s why we’re embedding agent controls into the places customers already rely on Imperva today:</p>
<ul>
<li><a href="https://www.imperva.com/products/web-application-firewall-waf/">Imperva Cloud WAF</a> for internet-facing API</li>
<li>Imperva WAF Gateway for on-prem and hybrid environment</li>
<li>Imperva eWAF for cloud-native and microservices workloads</li>
</ul>
<p>In each case, it’s the same security engine doing heavy lifting, discovering APIs, understanding protocols, analyzing behavior, and enforcing policy inline on every agent’s call.</p>
<h2><strong>Where we’re heading</strong></h2>
<p>AI agents are already inside organizations, helping engineers, answering customers, and automating operations. The real question is whether they’re operating inside guardrails you actually understand.</p>
<p>Our view is simple:</p>
<ul>
<li>You don’t secure AI by bolting something onto the model.</li>
<li>You secure AI by controlling the APIs and data the model can reach.</li>
</ul>
<p>By turning <a href="https://www.imperva.com/products/api-security/">API Security</a> into the shared control plane for AI agents, across discovery, protocol understanding, token governance, and business‑logic protection, we want to help teams say “yes” to AI without crossing their fingers behind their back.</p>
<p>If you can see every agent, every call, and every token, you can turn AI from a wild card into an engineered advantage. That’s the future we’re building toward.</p>
<p>The post <a href="https://www.imperva.com/blog/api-security-for-ai-agents-why-protection-has-never-been-more-important/">API Security for AI Agents: Why Protection Has Never Been More Important.</a> appeared first on <a href="https://www.imperva.com/blog">Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.imperva.com/blog/api-security-for-ai-agents-why-protection-has-never-been-more-important/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<enclosure type="image/jpg" url="https://www.imperva.com/blog/wp-content/uploads/sites/9/2024/02/shutterstock_1071270287-12.jpg" length="845" />	</item>
		<item>
		<title>Securing Applications Anywhere: Breaking Down the Wall of Confusion</title>
		<link>https://www.imperva.com/blog/securing-applications-anywhere-breaking-down-the-wall-of-confusion/</link>
					<comments>https://www.imperva.com/blog/securing-applications-anywhere-breaking-down-the-wall-of-confusion/#respond</comments>
		
		<dc:creator><![CDATA[Grainne McKeever]]></dc:creator>
		<pubDate>Mon, 23 Mar 2026 16:58:52 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<guid isPermaLink="false">https://www.imperva.com/blog/?p=20760</guid>

					<description><![CDATA[<p>Application development has changed dramatically. Enterprises now release software faster, operate more digital services, and deploy applications across a mix of public cloud, private cloud, APIs, containers, and on-premises infrastructure. As application delivery has accelerated and architectures have become more distributed, a disconnect has emerged between the teams building applications and those responsible for protecting [&#8230;]</p>
<p>The post <a href="https://www.imperva.com/blog/securing-applications-anywhere-breaking-down-the-wall-of-confusion/">Securing Applications Anywhere: Breaking Down the Wall of Confusion</a> appeared first on <a href="https://www.imperva.com/blog">Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1></h1>
<p>Application development has changed dramatically. Enterprises now release software faster, operate more digital services, and deploy applications across a mix of public cloud, private cloud, APIs, containers, and on-premises infrastructure.</p>
<p>As application delivery has accelerated and architectures have become more distributed, a disconnect has emerged between the teams building applications and those responsible for protecting them.</p>
<p>This tension is often described as the <a href="https://www.imperva.com/resources/resource-library/white-papers/devops-vs-security-breaking-down-the-wall-of-confusion-in-modern-application-delivery/">Wall of Confusion between DevOps and IT Security</a>.</p>
<p>But the challenge does not stop there.</p>
<p>Over time, organizations have also introduced multiple security tools to protect different parts of the application stack. Each tool is managed separately, often by different teams, through different platforms, policies, and workflows.</p>
<p>The result is an additional layer of complexity. Security teams must navigate multiple vendors and fragmented controls, while DevOps teams experience delays as security becomes harder to integrate into fast-moving development cycles.</p>
<p>Understanding how to break down both the organizational and operational layers of this confusion is essential for organizations that want to maintain innovation while ensuring consistent, scalable security.</p>
<h2>Applications Now Run Across Hybrid Environments</h2>
<p>Today, around <strong>forty percent of enterprise applications run in the public cloud</strong>, and that number is expected to rise significantly to 62% over the next two years.</p>
<p><img class="lazyload aligncenter size-full wp-image-20766 lazyload" alt="modern applicatoin delivery key finding 1" width="957" height="381" data-src="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/modern_applicatoin_delivery_key_finding_1.png" srcset="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/modern_applicatoin_delivery_key_finding_1.png 957w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/modern_applicatoin_delivery_key_finding_1-300x119.png 300w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/modern_applicatoin_delivery_key_finding_1-768x306.png 768w" sizes="(max-width: 957px) 100vw, 957px" /><br />
<span style="font-size: 12px;">Source: Vanson Bourne Survey, &#8220;DevOps vs Security: Breaking Down the Wall of Confusion in Modern Application Delivery&#8221;</span></p>
<p>Yet the shift to cloud does not mean applications live in one place. Most organizations now operate across hybrid and multi-cloud environments where applications run across public cloud platforms, private cloud infrastructure, on-premises systems, Kubernetes clusters, and an expanding network of APIs.</p>
<p>Cloud-agnostic strategies are also becoming more common as organizations seek flexibility and avoid dependence on a single provider. At the same time, many enterprises continue to operate legacy systems alongside modern cloud-native services.</p>
<p>The result is a highly distributed application landscape. Applications now run across multiple environments simultaneously, and security must be able to protect them wherever they operate.</p>
<p><img class="lazyload aligncenter size-full wp-image-20768 lazyload" alt="modern applicatoin delivery key finding 2" width="1144" height="346" data-src="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/modern_applicatoin_delivery_key_finding_2.png" srcset="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/modern_applicatoin_delivery_key_finding_2.png 1144w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/modern_applicatoin_delivery_key_finding_2-300x91.png 300w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/modern_applicatoin_delivery_key_finding_2-1024x310.png 1024w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/modern_applicatoin_delivery_key_finding_2-768x232.png 768w" sizes="(max-width: 1144px) 100vw, 1144px" /><br />
<span style="font-size: 12px;">Source: Vanson Bourne Survey, &#8220;DevOps vs Security: Breaking Down the Wall of Confusion in Modern Application Delivery&#8221;</span></p>
<h2>DevOps and Security Want the Same Outcome</h2>
<p>Despite the perception of conflict, DevOps and IT Security teams are largely aligned on the goals of modern application security. Both groups ultimately want the same outcome: applications that are secure, reliable, and able to scale with business demand.</p>
<p>Research <a href="https://www.imperva.com/resources/resource-library/white-papers/devops-vs-security-breaking-down-the-wall-of-confusion-in-modern-application-delivery/">conducted with Vanson Bourne</a> reinforces this alignment. <strong>96% of DevOps and 95% of IT Security professionals agree that modern environments require security that is flexible across any architecture.</strong></p>
<p>This global study of 1,500 professionals across the US, Europe, and APAC highlights an important point. Modern <a href="https://www.imperva.com/products/application-security/?_gl=1*1lpu15p*_gcl_aw*R0NMLjE3NzM2NTI1MzMuQ2p3S0NBancxTjdOQmhBb0Vpd0FjUGNocDMxZWNOSUloRkF5cjlKMXhCREQ3R0Q3WFp6LS14eWdfTENWYVNmRUJwczU3d0NfVDU2ZkV4b0NtaGNRQXZEX0J3RQ..*_gcl_dc*R0NMLjE3NzM2NTI1MzMuQ2p3S0NBancxTjdOQmhBb0Vpd0FjUGNocDMxZWNOSUloRkF5cjlKMXhCREQ3R0Q3WFp6LS14eWdfTENWYVNmRUJwczU3d0NfVDU2ZkV4b0NtaGNRQXZEX0J3RQ..*_gcl_au*MTYyNzI4MTcxMC4xNzY3Mjc0MTQ3LjU0NTY0MDk4OS4xNzcyMDI1Nzk1LjE3NzIwMjU3OTQ.">application security</a> is not just a technology problem. It is a workflow and collaboration challenge.</p>
<p>Security and DevOps want the same outcome, but they experience different frustrations. These gaps can create delays, bottlenecks, false positives, and friction that undermine the cloud-native innovation organizations are working to achieve.</p>
<h2>The Wall of Confusion: Conflicting Priorities, Fragmented Security and Tool Sprawl</h2>
<p>The Wall of Confusion is not just about DevOps and Security working in silos. It is also about how security is delivered. Over time, organizations have added more and more security tools. One for web applications, another for APIs, another for cloud, another for containers. Each tool solves a specific problem, but together they create complexity instead of clarity.</p>
<p>Security teams are left navigating multiple vendors, switching between management platforms, and maintaining different policies across environments. This makes it difficult to keep controls aligned and increases operational overhead.</p>
<p>At the same time, gaps begin to appear. As applications move across environments, it is not always clear if they are fully protected. Policies become inconsistent because what is set in one environment does not automatically apply to another.</p>
<p>In fact, based on a 2026 survey of Imperva Application Security customers, <strong>77% of security professionals say operational complexity is their biggest challenge</strong>.</p>
<p>For DevOps teams, this complexity shows up as delay. Security becomes a bottleneck not because it is unnecessary, but because it is too difficult to operationalize.</p>
<p>That is the wall and it is what needs to come down.</p>
<h2>Why Traditional Security Models Fall Short</h2>
<p>When applications operate across multiple environments, security approaches designed for fixed infrastructure quickly become difficult to manage.</p>
<p>Many organizations rely on a mixture of embedded protections, centralized security services, and environment-specific tools to protect different parts of their application landscape. While each solution may address a particular need, together they can create fragmented security architectures. This fragmentation leads to inconsistent policies, duplicated alerts, limited visibility, and increased manual effort. </p>
<p>Security teams must manage multiple tools and workflows, while development teams experience delays when security is applied inconsistently or too late in the process. Both teams are constrained by the same underlying issue: security models that were not designed for modern, distributed application environments.</p>
<h2>Security Must Move with the Application</h2>
<p>Modern applications are no longer tied to a single infrastructure model. They are composed of microservices and APIs, deployed through automated pipelines, and distributed across multiple environments.</p>
<p>Security therefore cannot remain a centralized checkpoint that appears late in the development process. Instead, protection needs to move with the application and operate consistently wherever that application runs.</p>
<p>This means security controls must function across public cloud environments, private infrastructure, hybrid deployments, Kubernetes clusters, APIs, and the traditional systems that many organizations still rely on.</p>
<p>DevOps and IT Security teams increasingly recognize this shift. They are not asking for less security. They are asking for security that works the way modern applications work.</p>
<h2>Securing Applications Anywhere with Thales</h2>
<p>As application architectures continue to evolve, organizations are no longer dealing with a single security challenge, but with the need to protect applications consistently across every environment they operate in.</p>
<p>The issue is not just distribution. It is how to secure that distribution without adding more tools, more complexity, or more operational overhead.</p>
<p>Security strategies built around isolated environments or disconnected tools are no longer sufficient. What is needed is a unified approach that delivers consistent protection, visibility, and control across the entire application landscape.</p>
<p>Now, the question becomes how to deliver that in practice.</p>
<p>Many vendors talk about flexibility but still require organizations to choose a single deployment model or manage multiple disconnected solutions. Imperva takes a fundamentally different approach. It meets organizations where they are, supporting multiple deployment models while maintaining a single, unified security experience.</p>
<p>This includes protection for internet-facing applications and APIs through Imperva Cloud, native integration for public cloud environments (<a href="https://www.imperva.com/products/imperva-for-google-cloud/">Imperva for Google Cloud</a>), container-based deployment for Kubernetes and microservices, and gateway deployment for on-premises, hybrid, and air-gapped environments.</p>
<p>The key is that all of these deployment options are powered by the same Imperva Security Engine.</p>
<p>This means one management console, consistent policies across every environment, and unified visibility across the entire application portfolio, regardless of where applications are deployed. Security teams do not need to manage multiple tools or vendors, and DevOps teams do not need to change how they build and deploy applications.</p>
<p>That is what securing applications anywhere really means.</p>
<p><strong>Download the whitepaper:</strong> <a href="https://www.imperva.com/resources/resource-library/white-papers/devops-vs-security-breaking-down-the-wall-of-confusion-in-modern-application-delivery/">DevOps vs Security: Breaking Down the Wall of Confusion in Modern Application Delivery</a></p>
<p>The post <a href="https://www.imperva.com/blog/securing-applications-anywhere-breaking-down-the-wall-of-confusion/">Securing Applications Anywhere: Breaking Down the Wall of Confusion</a> appeared first on <a href="https://www.imperva.com/blog">Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.imperva.com/blog/securing-applications-anywhere-breaking-down-the-wall-of-confusion/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<enclosure type="image/jpg" url="https://www.imperva.com/blog/wp-content/uploads/sites/9/2024/02/shutterstock_1071270287-15.jpg" length="845" />	</item>
		<item>
		<title>Why Most DDoS Protection Fails: Solving for Continuity and Resilience</title>
		<link>https://www.imperva.com/blog/why-ddos-protection-fails-continuity-resilience/</link>
					<comments>https://www.imperva.com/blog/why-ddos-protection-fails-continuity-resilience/#respond</comments>
		
		<dc:creator><![CDATA[Gayle Baird]]></dc:creator>
		<pubDate>Sun, 15 Mar 2026 13:04:34 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<guid isPermaLink="false">https://www.imperva.com/blog/?p=20750</guid>

					<description><![CDATA[<p>Most organisations assume DDoS (Distributed denial of service) protection is a box they’ve already ticked. If traffic spikes or an attack starts, the thinking goes, their provider will absorb it and move on. But in the real world it can be a different story. Many incidents aren’t caused by the scale of an attack alone, [&#8230;]</p>
<p>The post <a href="https://www.imperva.com/blog/why-ddos-protection-fails-continuity-resilience/">Why Most DDoS Protection Fails: Solving for Continuity and Resilience</a> appeared first on <a href="https://www.imperva.com/blog">Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Most organisations assume <a href="https://www.imperva.com/products/ddos-protection-services/">DDoS (Distributed denial of service) protection</a> is a box they’ve already ticked. If traffic spikes or an attack starts, the thinking goes, their provider will absorb it and move on.</p>
<p>But in the real world it can be a different story. Many incidents aren’t caused by the scale of an attack alone, they happen because their protection isn’t designed to act fast enough, distinguish legitimate traffic or stay active without disruption for normal traffic. Or slows the legitimate traffic down, degrading performance when under an attack.</p>
<p>In this blog, we look at why DDoS resilience is really about continuity, not just mitigation, and what teams often miss when they assume they’re already protected.</p>
<h2>The DDoS Protection Gap: Why Performance Breaks Under Pressure.</h2>
<p>Modern DDoS attacks rarely look like blunt floods now; they utilize <strong>multi-vector strategies</strong> targeting the application layer (Layer 7) to blend in. They overwhelm specific application paths or quietly degrade performance until frustrated users give up.</p>
<p>In 2025, Imperva Threat Research team observed an application-layer DDoS attack that peaked at <a href="https://www.imperva.com/company/press_releases/apis-become-primary-target-for-cybercriminals-over-40000-api-incidents-in-first-half-of-2025/">15 million requests per second against a financial services API</a>, a clear sign that attackers now combine scale with stealth tactics.</p>
<p>When protection isn’t built to handle this kind of attack, organisations often see:</p>
<ul>
<li>Delays between detection and mitigation</li>
<li>Legitimate users are blocked or challenged during peak moments</li>
<li>Performance degradation that’s dismissed as ‘normal slowing’</li>
<li>Downtime that occurs despite having DDoS controls in place</li>
</ul>
<p>The result is widespread impact, disrupting not just infrastructure, but revenue, brand reputation and most importantly, trust.</p>
<h2><strong>Why Modern </strong><strong>DDoS</strong><strong> Protection</strong><strong> is a</strong><strong> Business</strong> <strong>C</strong><strong>ontinuity </strong><strong>Challenge</strong></h2>
<p>Effective  <a href="https://www.imperva.com/learn/ddos/anti-ddos-protection/">DDoS protection</a> isn’t about surviving the largest possible attack on paper. It’s about ensuring users can continue to access applications, complete transactions and rely on important services, even when an attack is ongoing.</p>
<p>To do that organisations need protection that is:</p>
<ul>
<li>Not dependent on manual activation</li>
<li>Fast, with mitigation measured in seconds, not minutes or hours</li>
<li>Accurate, so legitimate users aren’t caught in the crossfire</li>
<li>Edge-based mitigation using a global Anycast network, stopping attacks before they put internal systems under pressure</li>
</ul>
<p>Without these characteristics, DDoS defences can become part of the problem rather than the solution.</p>
<h2>The Oversight: What Security Teams Miss About Resilience</h2>
<p>Many organisations unknowingly accept risk because they:</p>
<ul>
<li>Assume any DDoS protection will do the job</li>
<li>Focus on volumetric capacity but overlook detection accuracy, time to mitigate, mitigation efficacy and stealth attacks to the application layer</li>
<li>Rely on reactive or hybrid approaches that leave a mitigation gap</li>
<li>Accept user friction as an acceptable side effect of defence activity</li>
<li>Accept operational complexity as “the nature of the beast”</li>
</ul>
<p>Often, these gaps only become visible during critical moments such as launches, seasonal peaks or high-traffic events, when resilience matters most.</p>
<h2>The Solution: Supporting Continuity with Always-On Mitigation</h2>
<p>Thales’s Imperva DDoS Protection is designed to preserve availability and user experience, even during sustained or sophisticated attacks.</p>
<p>Behind the scenes, this means:</p>
<ul>
<li>Continuous and detailed profiling of peace-time traffic for fast identification of anomalies and potential DDoS attacks.</li>
<li>Always- on mitigation at the edge, eliminating delays in response with an industry-leading <strong>3</strong><strong>&#8211;</strong>     <strong>second </strong><strong>time-to-</strong><strong>mitigation SLA</strong> for network-layer attacks.</li>
<li>Versatile set of techniques for minimising disruption to legitimate users, including signatures, behavioural patterns and challenges.</li>
<li>Attack isolation for avoiding potential collateral damage.</li>
<li>Global scale and distribution, absorbing attacks close to the source.</li>
</ul>
<p>&nbsp;</p>
<h2>The Impact: Why True Resilience Matters for Revenue</h2>
<p>DDoS attacks don’t just test security controls; they test business resilience. When protection fails, the impact is immediate, abandoned sessions, lost transactions, frustrated customers and operational pressure at exactly the wrong moment.</p>
<p>DDoS resilience isn’t defined by how large an attack you can withstand, but by how consistently your services remain available while it’s happening.</p>
<p>By aligning always-on mitigation, rapid response and accurate traffic, classification, organisations can reduce risk without compromising user experience and ensure that availability isn’t dependent on perfect timing or manual intervention.</p>
<p>Because the true test of <a href="https://www.imperva.com/products/ddos-protection-services/">DDoS</a> protection is whether services remain available.</p>
<p>To discuss DDoS protection with a member of the team, <a href="https://www.imperva.com/contact-us/">get in touch</a>.</p>
<p>The post <a href="https://www.imperva.com/blog/why-ddos-protection-fails-continuity-resilience/">Why Most DDoS Protection Fails: Solving for Continuity and Resilience</a> appeared first on <a href="https://www.imperva.com/blog">Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.imperva.com/blog/why-ddos-protection-fails-continuity-resilience/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<enclosure type="image/jpg" url="https://www.imperva.com/blog/wp-content/uploads/sites/9/2022/07/Contingency-DDoS-Protection-e1657714550564.jpg" length="845" />	</item>
		<item>
		<title>When your DDoS mitigation provider goes down: Why traffic control can’t be outsourced</title>
		<link>https://www.imperva.com/blog/ddos-mitigation-provider-outage-traffic-control/</link>
					<comments>https://www.imperva.com/blog/ddos-mitigation-provider-outage-traffic-control/#respond</comments>
		
		<dc:creator><![CDATA[Ofir Shaham]]></dc:creator>
		<pubDate>Tue, 10 Mar 2026 15:48:33 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<guid isPermaLink="false">https://www.imperva.com/blog/?p=20732</guid>

					<description><![CDATA[<p>Since the headline-grabbing outages of 2021, we’ve had recurring conversations with large enterprises asking some version of the same question. Do we really want our CDN, security, and routing control to live in the same place? This issue of control has become more urgent after a series of well‑publicized, multi‑hour outages across major cloud‑based DDoS [&#8230;]</p>
<p>The post <a href="https://www.imperva.com/blog/ddos-mitigation-provider-outage-traffic-control/">When your DDoS mitigation provider goes down: Why traffic control can’t be outsourced</a> appeared first on <a href="https://www.imperva.com/blog">Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Since the headline-grabbing outages of 2021, we’ve had recurring conversations with large enterprises asking some version of the same question.</p>
<h2>Do we really want our CDN, security, and routing control to live in the same place?</h2>
<p>This issue of control has become more urgent after a series of well‑publicized, multi‑hour outages across major cloud‑based DDoS protection and security platforms. These incidents are rare but appear to be increasing in frequency. And when they happen, they expose architectural decisions many organisations haven’t revisited in years.  The fact is that architectures assumed providers would never fail. Reality proved them wrong.</p>
<p>The concern isn’t whether cloud <a href="https://www.imperva.com/products/ddos-protection-services/">DDoS mitigation</a> works. At scale, it does. The issue is control: whether customers retain the ability to reroute traffic independently if the provider itself goes down.</p>
<p>Many DDoS protection services simplify onboarding by originating customer prefixes and returning traffic via static paths. Under normal conditions, this works. During a provider outage, especially one affecting routing or orchestration, customers may lose the ability to reroute traffic<br />
independently. Recovery depends on provider‑side changes at the worst possible moment.</p>
<p>That’s when a DDoS mitigation service can become a single point of failure.</p>
<h2>Protection and control are different problems</h2>
<p>One thing we consistently hear from network and security teams is that DDoS attack mitigation and traffic control are often treated as the same problem. They aren’t.</p>
<p>Resilient architectures separate them:</p>
<table class="wp-block-table">
<thead>
<tr>
<th>Function</th>
<th>Who Should Control It</th>
</tr>
</thead>
<tbody>
<tr>
<td>Attack mitigation</td>
<td>DDoS provider</td>
</tr>
<tr>
<td>Traffic routing decisions</td>
<td>Customer network</td>
</tr>
</tbody>
</table>
<p>The Internet already provides a mechanism to enforce this separation: the Border Gateway Protocol (BGP). This is the Internet’s routing protocol; it determines how traffic is directed between the networks. </p>
<p>So, the real question isn’t whether to use cloud‑based DDoS protection. It’s whether that protection operates with your routing policy, or instead of it.</p>
<p>Resilient architectures treat attack mitigation and traffic control as separate concerns. Providers absorb DDoS attacks. Customers retain routing authority using BGP, enabling them to decide how traffic flows during failures.</p>
<p>When customers control BGP, outages take on a different character. They become routing events, not service outages. Traffic can be redirected faster, the blast radius is reduced, and network teams respond using familiar controls instead of escalation paths.</p>
<h2>Designing for the inevitable</h2>
<p>No provider is immune to failure. CDNs, hyperscalers, and DDoS mitigation services all operate complex, global control planes.</p>
<p>Resilience doesn’t come from assuming outages won’t happen. It comes from designing so that when they do, customers still control the outcome.</p>
<p>That’s why more organizations are adopting architectures where:</p>
<ul>
<li>DDoS protection is cloud‑delivered</li>
<li>Routing authority remains customer‑owned</li>
<li>BGP is the final decision layer for traffic steering</li>
</ul>
<p>This approach preserves the benefits of cloud‑scale mitigation while avoiding the creation of new single points of failure.</p>
<h2>A practical next step</h2>
<p>If you’re rethinking your DDoS architecture, your best starting point isn’t a product demo; it’s an architectural review. Here are some questions to ask yourself:</p>
<ul>
<li>Who originates your prefixes today?</li>
<li>How quickly can you reroute traffic if a provider is unavailable?</li>
<li>What dependencies exist between mitigation availability and network availability?</li>
</ul>
<p>Those answers usually reveal more than any outage postmortem.</p>
<p>On the Internet, control of routing is control of availability, and we think that control should always remain in customer&#8217;s hands.</p>
<p>Want to discuss what customer‑controlled DDoS protection looks like in practice? Get in touch with Thales to review your architecture.</p>
<p>The post <a href="https://www.imperva.com/blog/ddos-mitigation-provider-outage-traffic-control/">When your DDoS mitigation provider goes down: Why traffic control can’t be outsourced</a> appeared first on <a href="https://www.imperva.com/blog">Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.imperva.com/blog/ddos-mitigation-provider-outage-traffic-control/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<enclosure type="image/jpg" url="https://www.imperva.com/blog/wp-content/uploads/sites/9/2016/05/shutterstock_1071270287-13.jpg" length="845" />	</item>
		<item>
		<title>N8N: Shared Credentials and Account Takeover</title>
		<link>https://www.imperva.com/blog/n8n-shared-credentials-and-account-takeover/</link>
					<comments>https://www.imperva.com/blog/n8n-shared-credentials-and-account-takeover/#respond</comments>
		
		<dc:creator><![CDATA[Yohann Sillam]]></dc:creator>
		<pubDate>Tue, 03 Mar 2026 22:41:12 +0000</pubDate>
				<category><![CDATA[Imperva Threat Research]]></category>
		<guid isPermaLink="false">https://www.imperva.com/blog/?p=20724</guid>

					<description><![CDATA[<p>Executive Summary We identified a security weakness in n8n’s credential management layer that could have completely compromised the application’s security. This finding highlights the core risks of centralized authentication in workflow automation platforms. As n8n serves as the central hub connecting critical systems and orchestrating business processes across teams, any gap in credential handling can [&#8230;]</p>
<p>The post <a href="https://www.imperva.com/blog/n8n-shared-credentials-and-account-takeover/">N8N: Shared Credentials and Account Takeover</a> appeared first on <a href="https://www.imperva.com/blog">Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><strong>Executive Summary</strong></h2>
<p>We identified a security weakness in n8n’s credential management layer that could have completely compromised the application’s security. This finding highlights the core risks of centralized authentication in workflow automation platforms.</p>
<p>As n8n serves as the central hub connecting critical systems and orchestrating business processes across teams, any gap in credential handling can potentially cascade across connected systems, disrupting operations, compromising data flows, and credentials.</p>
<p>While this issue was fixed in v2.6.4, it reminds us about the unique security challenges of AI automation platforms.</p>
<h2><strong>Introduction</strong></h2>
<p>We are in a moment where AI and automation platforms are rapidly becoming embedded in everyday operations, allowing teams to connect models, APIs, SaaS tools, and internal systems with minimal friction.</p>
<p>Platforms like n8n promise powerful automation through visual workflows and reusable credentials, lowering the barrier to orchestrating complex tasks across services. But this convenience comes with structural risk: these tools centralize highly sensitive tokens, OAuth flows, and API keys, effectively concentrating trust in a single automation layer.</p>
<p>When that layer fails to enforce basic security controls, the impact is not limited to one workflow, it can extend across every connected system. In this research, we examine how a Stored XSS vulnerability in n8n’s OAuth credential handling can lead to account takeover and broader instance compromise.</p>
<h2><strong>The Vulnerability</strong></h2>
<p>The vulnerability lies in how n8n handles the &#8220;Authorization URL&#8221; within the OAuth credential setup. OAuth (Open Authorization) is an authorization framework that allows an application to access a user’s data on another service without exposing the user’s password.</p>
<p>In a standard workflow, users configure OAuth credentials to authenticate n8n with an external provider. When a user clicks &#8220;Connect my account,&#8221; n8n opens a popup window pointing to the service&#8217;s authorization page.</p>
<p>However, we discovered that the frontend function responsible for opening this window did not validate the protocol of the provided URL (see below). This allowed an attacker to bypass the expected scheme and inject JavaScript code.</p>
<h2><strong>The Attack Flow</strong></h2>
<p>Because n8n allows credentials to be <strong>shared</strong> between users in the same instance (collaborative features), a threat actor can weaponize this weakness, see Fig 1.</p>
<p><img class="lazyload alignnone size-full wp-image-20726 lazyload" alt="Screenshot 2026 03 03 at 11.23.08 AM" width="1474" height="1166" data-src="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/Screenshot-2026-03-03-at-11.23.08-AM.png" srcset="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/Screenshot-2026-03-03-at-11.23.08-AM.png 1474w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/Screenshot-2026-03-03-at-11.23.08-AM-300x237.png 300w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/Screenshot-2026-03-03-at-11.23.08-AM-1024x810.png 1024w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/Screenshot-2026-03-03-at-11.23.08-AM-768x608.png 768w" sizes="(max-width: 1474px) 100vw, 1474px" /></p>
<p style="text-align: center"><em>Fig. 1: High level view of the attack flow</em></p>
<p>The steps are the following:</p>
<ol>
<li><strong>Preparation:</strong> The attacker creates a new credential using the &#8220;OAuth2 API&#8221; type.</li>
<li><strong>Injection:</strong> In the &#8220;Authorization URL&#8221; field, instead of a valid URL, the attacker inserts a malicious JavaScript payload.</li>
<li><strong>Trap:</strong> The attacker shares this credential with the victim (e.g., an administrator or a user with higher privileges).</li>
<li><strong>Execution:</strong> The victim, seeing a shared credential, opens it and clicks &#8220;Connect my account.&#8221; The browser immediately executes the injected JavaScript in the context of the victim&#8217;s session instead of navigating to the remote authorization URL.</li>
</ol>
<h2><strong>Demonstration Video</strong></h2>
<p>The following video demonstrates the exploitation chain: sharing the malicious credential with a victim account and triggering the XSS payload.</p>
<div style="width: 1912px;" class="wp-video"><video class="wp-video-shortcode" id="video-20724-2" width="1912" height="360" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/542251408-e284416a-2115-4943-8f4a-13a87c32d4e7.mp4?_=2" /><a href="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/542251408-e284416a-2115-4943-8f4a-13a87c32d4e7.mp4">https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/542251408-e284416a-2115-4943-8f4a-13a87c32d4e7.mp4</a></video></div>
<h2><strong>Root Cause</strong></h2>
<p>During the OAuth flow, the browser initiates a top-level navigation to the authorization URL in the oAuthCredentialAuthorize function of the credential service. However, this segment of the program missed sanitation of the Authorization URL.</p>
<p><img class="lazyload alignnone size-full wp-image-20727 lazyload" alt="Screenshot 2026 03 03 at 12.05.56 PM" width="1474" height="846" data-src="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/Screenshot-2026-03-03-at-12.05.56-PM.png" srcset="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/Screenshot-2026-03-03-at-12.05.56-PM.png 1474w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/Screenshot-2026-03-03-at-12.05.56-PM-300x172.png 300w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/Screenshot-2026-03-03-at-12.05.56-PM-1024x588.png 1024w, https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/Screenshot-2026-03-03-at-12.05.56-PM-768x441.png 768w" sizes="(max-width: 1474px) 100vw, 1474px" /></p>
<p style="text-align: center"><em>Fig. 2: Vulnerable source code</em></p>
<h2><strong>Impact: Application Compromise</strong></h2>
<p>This is a stored XSS, meaning the payload is saved permanently in the database and served to any user who interacts with the credential. The impact of executing arbitrary JavaScript in the context of an n8n session is significant:</p>
<ol>
<li><strong>Account Takeover</strong>: The attacker can impersonate the victim’s in his session and force actions on their behalf, effectively taking over the account.</li>
<li><strong>Credential Exfiltration</strong>: The attacker can then use the XSS to query the internal n8n API and retrieve other credentials stored in the instance.</li>
<li><strong>Instance Control</strong>: With admin access gained via the XSS, the attacker can access more credentials, escalate privileges, and gain full control of the n8n instance.</li>
</ol>
<h2><strong>Conclusion</strong></h2>
<p>Workflow automation tools like n8n are becoming the backbone of modern IT infrastructure. While they offer immense power and speed, they also centralize trust. A vulnerability in this layer can often be more damaging than a vulnerability in a single isolated application.</p>
<p>We recommend organizations treat their automation platforms as Tier-0 assets, enforce strict access controls, and ensure they are patched promptly.</p>
<h2><strong>Timeline</strong></h2>
<ul>
<li>Jan 29 : Disclosure of the issue</li>
<li>Feb 6 : Issue fixed in v2.6.4</li>
</ul>
<p>The post <a href="https://www.imperva.com/blog/n8n-shared-credentials-and-account-takeover/">N8N: Shared Credentials and Account Takeover</a> appeared first on <a href="https://www.imperva.com/blog">Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.imperva.com/blog/n8n-shared-credentials-and-account-takeover/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/542251408-e284416a-2115-4943-8f4a-13a87c32d4e7.mp4" length="4540" type="video/mp4" />

		<enclosure type="image/jpg" url="https://www.imperva.com/blog/wp-content/uploads/sites/9/2026/03/image-1.jpg" length="1168" />	</item>
	</channel>
</rss>
