Wednesday, 6 May 2026
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
logo logo
  • World
  • Politics
  • Crime
  • Economy
  • Tech & Science
  • Sports
  • Entertainment
  • More
    • Education
    • Celebrities
    • Culture and Arts
    • Environment
    • Health and Wellness
    • Lifestyle
  • 🔥
  • Trump
  • House
  • ScienceAlert
  • White
  • VIDEO
  • man
  • Trumps
  • Season
  • star
  • Years
Font ResizerAa
American FocusAmerican Focus
Search
  • World
  • Politics
  • Crime
  • Economy
  • Tech & Science
  • Sports
  • Entertainment
  • More
    • Education
    • Celebrities
    • Culture and Arts
    • Environment
    • Health and Wellness
    • Lifestyle
Follow US
© 2024 americanfocus.online – All Rights Reserved.
American Focus > Blog > Tech and Science > Researchers broke every AI defense they tested. Here are 7 questions to ask vendors.
Tech and Science

Researchers broke every AI defense they tested. Here are 7 questions to ask vendors.

Last updated: January 23, 2026 3:45 pm
Share
Researchers broke every AI defense they tested. Here are 7 questions to ask vendors.
SHARE

Security teams are facing a critical challenge with AI defenses that are failing to protect against modern threats. A recent study by researchers from OpenAI, Anthropic, and Google DeepMind revealed that most AI defenses being used by enterprises are ineffective against adaptive attacks. These findings should prompt every Chief Information Security Officer (CISO) to reevaluate their current security measures.

The study, titled “The Attacker Moves Second: Stronger Adaptive Attacks Bypass Defenses Against Llm Jailbreaks and Prompt Injections,” tested 12 AI defenses that claimed to have near-zero attack success rates. However, the research team was able to bypass these defenses with success rates above 90%. This highlights a major gap in the security products currently available in the market, as they are being tested against attackers that do not behave like real threats.

The researchers tested various types of defenses, including prompting-based, training-based, and filtering-based methods, under adaptive attack conditions. All of these defenses failed to withstand the sophisticated attack techniques used in the study. Prompting defenses had attack success rates ranging from 95% to 99%, while training-based methods had bypass rates of 96% to 100%. This rigorous testing methodology exposed the vulnerabilities in these AI defenses, leading to a call for improved security measures.

One of the key reasons for the failure of these defenses is the statelessness of traditional security controls like Web Application Firewalls (WAFs) when faced with dynamic AI attacks. Attack techniques like Crescendo and Greedy Coordinate Gradient (GCG) exploit conversational context and automate malicious requests, bypassing static filters. These attacks operate at the semantic layer, making it difficult for signature-based detection to identify and prevent them.

See also  Google Play Store Warning Over Battery-Draining Android Apps

The rapid deployment of AI in enterprise applications, as predicted by Gartner, is exacerbating the security challenge. Attackers are evolving their tactics to bypass traditional endpoint defenses and exploit AI vulnerabilities. The shift towards AI-orchestrated cyber operations, as seen in the attack disrupted by Anthropic, is a clear indication of the growing threat landscape.

Four distinct attacker profiles are already exploiting the gaps in AI defenses, including external adversaries, malicious B2B clients, compromised API consumers, and negligent insiders. These attackers are leveraging adaptive attack techniques to breach defenses and exfiltrate sensitive data. The research paper’s authors have identified the need for stateful analysis, context tracking, and bi-directional filtering to improve security measures against conversational attacks.

To address these vulnerabilities, security leaders need to ask critical questions to AI security vendors before procuring their products. These questions should focus on the bypass rate against adaptive attackers, detection of multi-turn attacks, handling of encoded payloads, filtering of outputs, context tracking across conversation turns, testing against attackers who understand defense mechanisms, and the mean time to update defenses against novel attack patterns.

In conclusion, the research findings underscore the urgent need for enterprises to reassess their AI security measures in light of evolving threats. The deployment of AI technologies is outpacing security capabilities, creating a gap that attackers are exploiting. By implementing robust security measures and collaborating with reputable vendors, organizations can better protect their AI deployments from sophisticated attacks.

TAGGED:brokedefenseQuestionsResearcherstestedvendors
Share This Article
Twitter Email Copy Link Print
Previous Article Former executives of device maker Zynex Medical indicted for fraud Former executives of device maker Zynex Medical indicted for fraud
Next Article The Duality Of Love, Now In Watch Form The Duality Of Love, Now In Watch Form
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.

Popular Posts

New York City Ballet Art Series Presents Elizaveta Porodina — Colossal

Elizaveta Porodina is a talented photographer and artist hailing from Munich, Germany. Known for her…

January 9, 2025

Trump Clowns Communist Venezuela With a Sarcastic Message and Hilarious Footage of Their “Militia Training” as Tensions Rise Between the Two Nations (VIDEO) | The Gateway Pundit | by Cullen Linebarger

President Trump kicked off the week with a characteristic blend of bravado and provocation, targeting…

September 22, 2025

Trump’s Immigration Plan To Kill Jobs And Raise Prices

Economists are sounding the alarm on President Trump's proposed mass deportation plan, warning that it…

November 14, 2024

The Bone Temple review: Alex Garland’s 28 Days Later sequel is brutal, brilliant – and mind-blowing

In the world of post-apocalyptic cinema, few films have had as much impact as "28…

January 21, 2026

Denisovans may have interbred with mysterious group of ancient humans

Illustration of a teenage girl who is the offspring of a Neanderthal mother and Denisovan…

October 31, 2025

You Might Also Like

Google Pixel Phone eSIM Bug Reported
Tech and Science

Google Pixel Phone eSIM Bug Reported

May 6, 2026
Peter Sarlin’s QuTwo reaches 0M valuation in angel round
Tech and Science

Peter Sarlin’s QuTwo reaches $380M valuation in angel round

May 6, 2026
Expert Explains Why Cruise Ships Are So Prone to Disease Outbreaks : ScienceAlert
Tech and Science

Expert Explains Why Cruise Ships Are So Prone to Disease Outbreaks : ScienceAlert

May 6, 2026
One command turns any open-source repo into an AI agent backdoor. OpenClaw proved no supply-chain scanner has a detection category for it
Tech and Science

One command turns any open-source repo into an AI agent backdoor. OpenClaw proved no supply-chain scanner has a detection category for it

May 5, 2026
logo logo
Facebook Twitter Youtube

About US


Explore global affairs, political insights, and linguistic origins. Stay informed with our comprehensive coverage of world news, politics, and Lifestyle.

Top Categories
  • Crime
  • Environment
  • Sports
  • Tech and Science
Usefull Links
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA

© 2024 americanfocus.online –  All Rights Reserved.

Welcome Back!

Sign in to your account

Lost your password?