**Cybersecurity News Roundup: AI Agents, Ransomware, and Quantum Threats**

As we navigate the rapidly evolving landscape of cybersecurity, several key trends and incidents have come to light in recent weeks.

**AI Agent Access Management**

A survey conducted by the Cloud Security Alliance reveals that a majority of organizations have AI agents active in core systems, yet there is fragmented ownership of how those agents authenticate and what they can access. This highlights the need for better management and oversight of AI agent access.

**Ransomware and Botnets**

A Russian national has been sentenced to 24 months in prison for managing a botnet used to launch ransomware attacks against dozens of U.S. companies, resulting in $14 million in extortion payments. Additionally, three individuals have been charged with attempting to smuggle $170 million worth of AI technology to China.

**Quantum Threats and Encryption**

Google is preparing for the quantum era by developing post-quantum cryptography (PQC) migration plans, aiming to complete the transition by 2029. Security professionals warn that current encryption could be broken by large-scale quantum computers in the coming years.

**Other Key Developments**

* GitHub has updated its application security capabilities with AI-powered security detections designed to identify risks earlier in the development process. * Microsoft has made external MFA generally available in Microsoft Entra ID, expanding support for third-party identity providers. * Oracle's Unbreakable Enterprise Kernel 8.2 (UEK 8.2) extends hardware-level memory isolation to protect sensitive workloads from co-tenants and compromised hypervisors.

**Recommendations**

To stay ahead of emerging threats and ensure the security of AI agents, organizations should:

1. Conduct regular audits and risk assessments to identify potential vulnerabilities. 2. Implement robust access management and authentication controls for AI agents. 3. Stay informed about the latest developments in AI abuse and safety risks through programs like OpenAI's Safety Bug Bounty. 4. Consider implementing post-quantum cryptography migration plans to future-proof encryption.

By prioritizing these steps, organizations can minimize their exposure to emerging threats and ensure a safer, more secure digital environment for all stakeholders.

Stay tuned for further updates on the latest cybersecurity trends and developments!