NIST, MITRE announce $20 million research effort on AI cybersecurity

CyberScoop

Overview

The National Institute of Standards and Technology (NIST) and MITRE have announced a $20 million initiative aimed at researching the role of artificial intelligence in cybersecurity, particularly concerning critical infrastructure. This new research center will unite experts from both government and industry to explore how AI can enhance security measures and address vulnerabilities. The focus is on understanding AI's potential to both bolster defenses against cyber threats and the risks it may introduce. Given the increasing reliance on technology for essential services, this research could have significant implications for national security and public safety. The collaboration aims to prepare for future challenges in cybersecurity as AI continues to evolve.

Key Takeaways

  • Timeline: Newly disclosed

Original Article Summary

The effort includes a new research center that will bring government and industry experts together to study how AI will impact cybersecurity in critical infrastructure. The post NIST, MITRE announce $20 million research effort on AI cybersecurity appeared first on CyberScoop.

Impact

Not specified

Exploitation Status

The exploitation status is currently unknown. Monitor vendor advisories and security bulletins for updates.

Timeline

Newly disclosed

Remediation

Not specified

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Critical.

Related Coverage

PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)

Help Net Security

A serious vulnerability, identified as CVE-2025-64155, has been discovered in Fortinet’s FortiSIEM security platform, allowing unauthenticated remote attackers to execute unauthorized code. This flaw specifically affects the phMonitor service, which is crucial for the operation of FortiSIEM. The release of proof-of-concept (PoC) exploit code has heightened concerns, urging organizations using this software to apply patches immediately. If not addressed, this vulnerability could lead to significant security risks, as attackers could manipulate the system remotely. Organizations should prioritize patching their FortiSIEM deployments to safeguard against potential exploitation.

Jan 15, 2026

Data Privacy Teams Face Staffing Shortages and Budget Constraints, ISACA Warns

Infosecurity Magazine

ISACA's State of Privacy 2026 report reveals a worrying trend in data privacy teams across various organizations. Despite increasing regulatory demands and technical challenges surrounding data privacy, these teams are struggling with staffing shortages and limited budgets. This situation puts many companies at risk, as they may not have sufficient resources to address privacy concerns effectively. As regulations become stricter and data breaches more common, the lack of adequate support for privacy teams could lead to severe compliance issues and potential fines. The report emphasizes the urgent need for organizations to invest in their data privacy capabilities to safeguard sensitive information and maintain trust with customers.

Jan 15, 2026

Cursor vulnerability enables stealthy RCE via indirect prompt injection

SCM feed for Latest

A newly identified vulnerability, dubbed the 'Cursor vulnerability,' allows attackers to execute shell built-in commands without the user's consent. This means that malicious actors could potentially run commands indirectly through prompt injection methods, leading to remote code execution (RCE). The risk is concerning as it could compromise systems by letting unauthorized users manipulate or access sensitive data. Users of systems that incorporate shell commands should be particularly vigilant and ensure their environments are secure. It's crucial for organizations to assess their exposure to this vulnerability and take appropriate measures to mitigate the risks.

Jan 15, 2026

Trio of Critical Bugs Spotted in Delta Industrial PLCs

darkreading

Researchers have identified three significant vulnerabilities in programmable logic controllers (PLCs) from Delta, a manufacturer known for industrial automation solutions. The debate among experts centers on the severity of these flaws; some view them as critical threats that could lead to serious disruptions in industrial operations, while others believe the risks are manageable. The vulnerabilities could potentially allow unauthorized access or manipulation of the PLCs, which are essential for controlling machinery and processes in various industries. Companies using Delta's PLCs should assess their systems and consider implementing security measures to mitigate any potential risks. As the discussion continues, it’s crucial for users to stay informed and proactive about their cybersecurity posture.

Jan 15, 2026

FTC bans GM from selling drivers' location data for five years

BleepingComputer

The Federal Trade Commission (FTC) has reached an agreement with General Motors (GM) after charging the company with improperly collecting and selling the location and driving data of millions of drivers without their consent. This order prohibits GM from selling this data for five years, ensuring that drivers' privacy is better protected moving forward. The FTC's action underscores the importance of consumer consent in the collection of personal data, especially in an era where location tracking is prevalent in vehicles. The settlement aims to hold GM accountable for its practices and serves as a warning to other companies about the need to respect consumer privacy rights. Millions of drivers who use GM vehicles are affected by this decision, which seeks to restore trust in how their data is handled.

Jan 15, 2026

Lumen disrupts AISURU and Kimwolf botnet by blocking over 550 C2 servers

Security Affairs

Lumen's Black Lotus Labs has successfully disrupted a significant portion of the AISURU and Kimwolf botnet by blocking over 550 command-and-control (C2) servers. This botnet is notorious for facilitating DDoS attacks and proxy abuse, acting as a DDoS-for-hire service that has been used to target various organizations. By taking these C2 servers offline, Lumen aims to reduce the operational capabilities of this botnet, which has been a persistent problem for cybersecurity professionals. The disruption not only impacts the botnet operators but also helps protect potential victims from being targeted in future attacks. This action underscores the ongoing battle against cybercrime and highlights the importance of proactive measures in cybersecurity.

Jan 15, 2026