Daily Cyber & AI Briefing with Michael Housch. This episode was published automatically and includes the assembled audio plus full transcript.
Welcome to today’s cyber and AI risk briefing. I’m Michael Housch, and in the next 15 minutes, we’ll unpack the most pressing developments shaping the risk landscape for CISOs, security leaders, and organizations navigating an increasingly complex digital environment. We’ll cover the latest active threats, emerging attack techniques, and the strategic shifts required to maintain resilience and trust as both cyber and AI risks evolve.
Let’s start with the big picture. The cyber threat landscape is moving faster than ever. Attackers are exploiting vulnerabilities in critical infrastructure—often before those vulnerabilities are even publicly disclosed. We’re seeing a marked increase in attacks targeting identity and cloud platforms, and, notably, adversaries are now turning their attention to the very AI security tools designed to protect us. This convergence of threats means that traditional perimeter defenses are no longer enough. Organizations need adaptive, layered controls that address both technical and human risks.
Governance, particularly around AI, is emerging as a central pillar of organizational resilience. It’s not just about adopting AI, but about how you govern it—how you measure risk, ensure compliance, and build trust with stakeholders. New metrics and independent assessments are quickly becoming the standard for responsible AI and cyber risk management.
With that context, let’s dive into the top items shaping today’s risk environment.
First up: CISA has issued an urgent alert regarding a newly discovered SD-WAN vulnerability. This flaw affects Cisco Catalyst SD-WAN Manager, a platform widely used to manage distributed network environments. Attackers are actively exploiting this vulnerability to gain unauthorized access, with the potential to move laterally within enterprise networks. Given how central SD-WAN is to remote connectivity and network segmentation, this is not a theoretical risk—it’s a real and present danger.
If your organization relies on SD-WAN, especially Cisco Catalyst, patching should be your top priority. But patching alone isn’t enough. Review your network segmentation policies and monitor for unusual activity around SD-WAN controllers. The goal is to prevent attackers from using this foothold to access sensitive parts of your network. This is a textbook example of how attackers exploit the complexity of modern infrastructure, and why rapid patch management and continuous monitoring are critical.
Next, let’s talk about Apache ActiveMQ. There’s a critical vulnerability—CVE-2026-34197—currently being exploited in the wild. Over 6,000 servers are exposed online, giving attackers a broad attack surface. The flaw allows for remote code execution, which can lead to data exfiltration or lateral movement across your environment. What’s striking here is the prevalence of unpatched systems, especially given how widely ActiveMQ is used for messaging and integration.
For organizations using ActiveMQ, immediate action is needed. Patch your systems, reduce unnecessary exposure, and review your incident response plans. This is a clear illustration of the challenges organizations face in managing vulnerabilities in open-source components. Attackers are counting on slow patch cycles and overlooked systems—don’t give them that opportunity.
Now, a concerning trend: GreyNoise has reported a surge in attacker activity immediately before public vulnerability disclosures. What does this mean? Adversaries are watching for early signals—maybe a researcher’s tweet, a commit in an open-source repo, or a subtle change in vendor documentation. They’re exploiting vulnerabilities before defenders even know what’s coming. This underscores the importance of integrating threat intelligence into your workflow