Want to appear here? Talk with us

AI Coding Assistance
AI coding assistants amplify deeper cybersecurity risks

AI coding assistants have become popular tools for developers because they help speed up writing software. However, they also bring new security risks that are important to understand and manage.

Security Risks in AI Code Suggestions
These assistants often suggest code that might have hidden security flaws. Because developers tend to trust AI-generated code, these issues can easily slip into real projects without proper review. Common problems include code vulnerable to attacks like SQL injection, embedding secrets such as passwords in the code, and using outdated components that contain known weaknesses.

Attacks Targeting AI Assistants
Beyond insecure code suggestions, attackers may manipulate the AI itself through techniques like prompt injection. This allows malicious actors to trick the AI into generating harmful commands or stealing sensitive information invisibly. These attacks highlight a new risk where AI coding tools become a vector for cyberattacks within the software supply chain.

Training Data and Model Limitations
The security of AI coding helpers depends heavily on their training data, usually sourced from public code repositories. If this data includes insecure coding patterns or exposed secrets, the assistant may replicate these vulnerabilities. The AI models lack deep understanding of context or application-specific needs, often producing syntactically correct but insecure code. This can lead to replicated flaws widely affecting many projects, creating large-scale risks.

Balancing Productivity and Security
While AI-powered tools boost developer productivity and reduce simple mistakes, they come with a trade-off: the rise of more complex and severe vulnerabilities that automated tools struggle to detect. This may increase the risk of serious breaches if unchecked. Developers, security teams, and organizations must maintain rigorous security reviews, testing, and monitoring when using AI coding assistants.

Building Safer AI Coding Environments
Companies need to improve safeguards inside AI tools and ensure developers are trained to recognize risks. Strategies include comprehensive code reviews, controlling what AI-generated code is executed, and continuous security awareness. As AI assistants become more integrated and autonomous, adapting security measures to evolving threats will be critical.

Security Incident
‘Widespread’ breach let hackers steal employee data from FEMA and CBP

A significant data breach took place during the summer months of 2025, targeting the Federal Emergency Management Agency (FEMA) and the U.S. Customs and Border Protection (CBP). Hackers gained access to FEMA's Region 6 computer systems, which cover Arkansas, Louisiana, New Mexico, Oklahoma, and Texas, using compromised login credentials and a vulnerability in Citrix remote desktop software. This breach allowed the attackers to steal sensitive employee information, including names, contact details, social security numbers, and possibly financial data and security clearances.

How the Attack Unfolded

The breach began quietly on June 22, 2025, and went undetected for several weeks. The Department of Homeland Security (DHS) notified FEMA on July 7 about suspicious activity linked to the sharing of compromised credentials. By July 14, the hackers escalated their access by installing virtual private network software to further penetrate FEMA’s network. They eventually accessed Microsoft Active Directory, a crucial system for managing access rights, which facilitated the extraction of sensitive data from both FEMA and CBP systems due to shared infrastructure.

Agency Response and Fallout

FEMA responded by disabling the vulnerable Citrix tool on July 16 and implementing multifactor authentication for all employees. Despite these efforts, the breach exposed serious security gaps. Homeland Security Secretary Kristi Noem took decisive action by firing about two dozen FEMA IT staff, including senior technology leaders, citing “serious security failures” that left the department vulnerable. This event raised questions about ongoing cybersecurity challenges within federal agencies, including issues with patching software vulnerabilities and real-time threat detection.

Broader Security Implications

This breach underscores persistent weaknesses in federal cybersecurity practices. The ability of hackers to remain undetected for weeks points to gaps in monitoring and behavior analysis systems. The incident also exposes risks related to interconnected federal networks, where a breach in one agency can easily spread to others. Experts have linked similar methods to state-sponsored cyber campaigns, increasing concerns about national security.

Final Thoughts

The breach at FEMA and CBP reveals pressing needs for stronger cybersecurity controls, improved software patch management, and enhanced monitoring tools in government networks. Protecting sensitive employee information is critical to maintaining trust and operational readiness in federal agencies responsible for national security and disaster management.

Awareness
Employees learn nothing from phishing security training, and this is why

Phishing simulations are a common way companies try to train employees to spot phishing emails. However, these trainings often do not work well, leaving people still vulnerable.

Why Training Falls Short
Most employees don’t learn much from standard phishing training sessions. These programs usually involve sending fake phishing emails and then telling employees which ones were real or fake afterward. But simple tests and one-time lessons don’t change behavior for long. People tend to forget quickly or find ways to guess the test without really understanding phishing risks.

The Real Problem
The article highlights that phishing attacks are designed to trick humans by imitating real communication or offering something tempting. So, training has to go deeper than just spotting obvious signs. It needs to help people think critically about emails and understand tactics attackers use, which most current trainings fail to do.

Better Approaches
Effective phishing defense requires ongoing efforts, not one-off quizzes. This includes regular, varied training, real-time feedback, and building a culture where people feel comfortable reporting suspicious emails. It also suggests combining technology with education to reduce risk.

The key takeaway is that simple phishing tests alone don’t teach employees enough. Stronger, more thoughtful programs and continuous practice are essential to help people truly recognize and avoid phishing attacks.

Survey
Two-Thirds of Organizations Have Unfilled Cybersecurity Positions

The demand for cybersecurity professionals continues to rise sharply, yet many companies struggle to fill open positions. Currently, around two-thirds of cybersecurity jobs globally remain vacant, with roughly 4.8 million roles unfilled. This gap is larger than ever and puts businesses at risk, as skilled defenders are critical to stopping cyberattacks and protecting sensitive data.

Numbers and Trends to Know

The global cybersecurity workforce stands at about 5.5 million, but to meet the growing threats, the industry needs to grow by nearly 87%. Some regions like Asia-Pacific face the largest shortfalls, with millions of unfilled roles, while even countries like the U.S. have more than half a million vacancies. Many organizations report long hiring times of six months or more, making it difficult to keep teams staffed. Financial services, manufacturing, consumer goods, and tech sectors make up a significant portion of this gap.

Skill Mismatch and Economic Impact

The challenge is not only finding more people but also finding the right skills. Modern cybersecurity demands expertise in areas such as cloud security, artificial intelligence, and penetration testing. Employers increasingly value problem solving, critical thinking, and communication skills alongside technical knowledge. Unfortunately, economic pressures and budget cuts have slowed hiring and training, making the shortage worse.

Approaches to Fix the Shortage

Companies are responding by investing in upskilling current staff, launching apprenticeship programs, and incorporating automation and AI to assist security teams. There is a push to move beyond simple hiring goals towards building resilient teams with the right mix of skills. Expanding access to certifications and hands-on training programs also helps develop new talent faster.

The clear message is that the cybersecurity workforce gap is a complex and urgent problem. A combined effort in education, hiring, and smart technology use is needed to protect organizations against growing cyber threats and to secure the future of digital safety.

CISO Perspectives
Boards should be ‘bilingual’ in AI, security to gain advantage

AI is changing business fast. To keep up, boards and security teams need to speak both the languages of AI and cybersecurity. This helps them understand how to protect AI from threats and how AI can also help defend companies. Learning this language lets boards use AI to gain a business edge.

Boards should treat cybersecurity as part of their core duties, not just the risk or audit teams. Becoming bilingual in AI and security means they focus on why understanding their company’s security matters and how to get ready for breaches. Here are four ways leaders can drive real progress:

Integrate Cybersecurity into Business Strategy
As threats grow from lone hackers to organized groups, boards must work closely with security teams to align protection with critical business activities. This makes the company stronger and ready for new threats.

Develop a Clear Framework for Security Spending
Boards should make sure cybersecurity investments deliver real value, beyond just compliance. This means examining critical assets, breach risks, and the real costs of attacks. Using third-party reviews and simulated attack exercises helps measure investment effectiveness.

Make Cybersecurity a Priority in Mergers and Acquisitions
Security checks on companies being bought are key. Boards can guide plans to fix vulnerabilities, segregate networks, and start with secure equipment on day one. Outside assessments help set clear integration paths.

Build a Cyber-Aware Culture from the Top
Security starts at the top. Boards should include cybersecurity as a regular topic and hold leaders accountable for clear security goals and resources. This shows security is a must-have priority for the whole company.

Cybersecurity has moved to the top of board concerns, not least because AI both helps and challenges security practices. Boards that learn to work in both AI and security languages will better protect their firms and push industries forward.

That’s all for this week.

Keep Reading

No posts found