meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

Attack of the automated ops. [Research Saturday]

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 1 November 2025

⏱️ 21 minutes

🧾️ Download transcript

Summary

Today we are joined by Dario Pasquini, Principal Researcher at RSAC, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vector. The researchers introduce AIOpsDoom, an automated reconnaissance + fuzzing + LLM-driven telemetry-injection attack that performs “adversarial reward-hacking” to coerce agents into harmful remediations—even without prior knowledge of the target and even against some prompt-defense tools. They also present AIOpsShield, a telemetry-sanitization defense that reliably blocks these attacks without harming normal agent performance, underscoring the urgent need for security-aware AIOps design. The research can be found here: ⁠When AIOps Become “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:10.2

Risk and compliance shouldn't slow your business down.

0:16.2

Hyperproof helps you automate controls, integrate real-time risk workflows,

0:20.5

and build a centralized system of trust,

0:23.4

so your teams can focus on growth, not spreadsheets.

0:27.3

From faster audits to stronger stakeholder confidence, Hyperproof gives you the business advantage of smarter compliance.

0:34.4

Visit www.hyperproof.io to see how leading teams are transforming their GRC programs.

0:46.3

And now a word from our sponsor, Threat Locker, the powerful zero-trust enterprise solution that stops ransomware in its tracks.

1:00.2

Allow listing is a deny-by-default software that makes application control simple and fast.

1:06.1

Ring fencing is an application containment strategy, ensuring apps can only access the files, registry keys,

1:13.2

network resources, and other applications they truly need to function.

1:17.8

Shut out cybercriminals with world-class endpoint protection from threat locker.

1:22.2

Thank you. Hello everyone and welcome to the CyberWires Research Saturday.

1:35.7

I'm Dave Bittner, and this is our weekly conversation with researchers and analysts

1:40.9

tracking down the threats and vulnerabilities, solving some of the hard problems

1:45.4

and protecting ourselves in a rapidly evolving cyberspace. Thanks for joining us.

1:56.1

First of all, the term IOPs stands for AI for IT applications.

2:03.6

And it's a term that has been around for a long time actually.

2:08.6

We saw the first appearance of the term in 2016,

2:14.6

where it was many about using machine learning models

2:18.1

to perform anomaly detections.

2:21.1

That's Dario Pasquini, principal researcher at RSAC Labs.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.