← Back to Home
April 26, 2026

AI Agents Are Everywhere But Trusted Nowhere

Chained Palo Alto vulnerabilities gave attackers root access to 13,000 devices
SECURITY

Chained Palo Alto vulnerabilities gave attackers root access to 13,000 devices

Here is the number that should ruin your Monday: 13,000 devices compromised, not because attackers found some exotic zero-day, but because two known vulnerabilities were chained together in a way that security teams simply failed to prioritize in time.

The attack targeted Palo Alto Networks infrastructure, and the core problem was not the vulnerabilities themselves. It was how organizations scored and triaged them. Each flaw, evaluated in isolation, looked manageable. Together, they handed attackers root-level access — the keys to the kingdom — on a massive scale.

This is what security professionals call a chaining attack, and it is becoming the dominant playbook for sophisticated threat actors. The logic is almost elegant in a terrifying way: why burn a high-profile zero-day when you can stitch together two medium-severity bugs that defenders deprioritized because the CVSS scores did not scream emergency?

The CVSS scoring system — the industry's go-to method for ranking vulnerability severity — is increasingly looking like a relic. It scores flaws individually, in a vacuum, without accounting for how attackers actually operate in the real world. Security directors are now being forced to reckon with that gap in a very public and painful way.

For enterprises running Palo Alto gear, the immediate lesson is obvious: patch faster, and stop treating vulnerabilities as independent line items on a spreadsheet. But the broader lesson cuts across the entire industry. Triage frameworks that do not account for chaining potential are not just incomplete — they are actively dangerous.

What makes this incident particularly instructive is the scale. Thirteen thousand devices is not a targeted espionage operation against a handful of high-value entities. That is a wide net, which suggests the attackers were either automating the exploitation chain or had enough time and access to move methodically across exposed systems before defenders caught on.

Security teams are chronically understaffed and drowning in alerts, so prioritization decisions matter enormously. When those decisions are driven by a scoring system that does not reflect real-world threat combinations, the result is exactly what we saw here: a breach that looked preventable in hindsight because, frankly, it was.

The fix is not simple. Organizations need threat intelligence that contextualizes vulnerabilities against their specific environment and attack surface. They need tooling that models how flaws might be combined, not just how severe each one looks standing alone. And they need to pressure vendors — including scoring bodies — to evolve frameworks that were designed for a different era of attacks.

The attackers already figured out how to chain vulnerabilities together. Defenders need to start thinking the same way.
Source: VentureBeat
85 percent of enterprises run AI agents but only 5 percent trust them in production
AI

85 percent of enterprises run AI agents but only 5 percent trust them in production

Eighty-five percent of enterprises are already running AI agents. Only five percent trust them enough to let them operate in a real production environment. That gap — 80 percentage points wide — is one of the most telling statistics in tech right now.

Think about what that actually means. The vast majority of large organizations have built, deployed, or are actively experimenting with autonomous AI systems. And almost none of them are willing to let those systems make real decisions on real data with real consequences. That is not adoption. That is a very expensive science fair.

The enthusiasm for AI agents is completely understandable. The pitch is compelling: systems that can reason across tasks, take actions, adapt to new information, and work without constant human babysitting. For enterprises dealing with sprawling operations and talent constraints, that sounds like a genuine solution to genuine problems.

But somewhere between the demo and the deployment, trust breaks down. And that trust problem is not irrational — it is actually pretty reasonable given where the technology is.

AI agents fail in ways that are hard to predict and harder to explain. They can confidently take the wrong action, misinterpret ambiguous instructions, or behave well in testing and then go sideways in production when they encounter data or scenarios that look just slightly different from what they were built for. For a company processing financial transactions or managing customer relationships, that kind of unpredictability is not an acceptable risk.

There is also a governance vacuum that enterprises are navigating in real time. Most organizations do not yet have clear frameworks for who is accountable when an AI agent makes a bad call. Legal, compliance, and risk teams are still working out what oversight even looks like for systems that are designed to act autonomously. Until those frameworks exist, caution is the rational position.

What the 5 percent who do trust agents in production have figured out is worth studying. Generally, it comes down to narrow scope. The agents that make it into production tend to have tightly constrained tasks, robust guardrails, human review built into consequential decisions, and extensive logging so that failures can be diagnosed and corrected. They are not fully autonomous — they are more like well-supervised junior employees.

The industry hype has consistently framed AI agents as a near-term replacement for significant chunks of human cognitive labor. The actual deployment data suggests something more modest and more honest: agents are useful tools that require careful engineering, meaningful oversight, and a lot of organizational change management before they can be trusted at scale.

Eighty percent of enterprises are somewhere in the middle of that journey. The question is how long they are willing to fund the science fair before demanding something they can actually ship.
Source: VentureBeat

Enjoyed this?

Get stories like this delivered every Tuesday — free.