Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried the only agentive browser that runs native AI – and found only one downside

    November 7, 2025

    Get 4 Free iPhone 17 or Galaxy S25 Phones from T-Mobile Right Now – Here’s How

    November 7, 2025

    She has 3 secrets to doubling the revenue of your mom’s business

    November 7, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»AI/ML»AI agent phishing: Proofpoint’s new defense
    AI/ML

    AI agent phishing: Proofpoint’s new defense

    PineapplesUpdateBy PineapplesUpdateOctober 27, 2025No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    AI agent phishing: Proofpoint’s new defense
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Email security has always been a game of cat and mouse. Viruses have been invented, and Antivirus software has been invented to catalog known viruses and detect their presence in email attachments and URLs. As viruses evolved into more sophisticated forms of malware, cybersecurity tools adapted to be able to scan and detect these new threats. Phishing became the next area, which gave rise to new tools as well as a whole new category of security, known as security awareness training. Now, The bad guys are attacking AI agents to bypass current security guardrails.

    “AI assistants, co-pilots and agents significantly expand the enterprise attack surface in ways that traditional security architectures were not designed to handle,” said Todd Thieman, cybersecurity analyst at the research firm. Omdiya,

    Enter a range of AI-based features for Proofpoint Prime Threat Protection Which were introduced at the company’s Proofpoint Protect 2025 event in September. They thwart hackers’ attempts to subvert the actions of AI agents by scanning for potential threats before email messages arrive in the inbox.

    Traditional approach to email security

    Most email security tools are designed to detect known bad signals like suspicious links, fake domains that look real, or attachments containing malware. This approach works well against traditional phishing, spam, and known exploits. But cybercriminals are now going after the many AI assistants and AI agents that have become embedded in the workplace.

    They do this by taking advantage of signals (questions or commands in text or code form) that guide AI models and AI agents to either generate relevant responses or perform certain actions. Increasingly, emails contain hidden, malicious signals that use invisible text or special formatting designed to trick generic AI tools such as Microsoft Copilot And google gemini Performing insecure actions, such as exfiltrating data or bypassing security checks.

    Thieman said, “Quick injection and other AI-targeted exploits represent a new class of attacks that use text-based payloads that manipulate machine logic rather than human behavior.”

    Daniel Rapp, Chief AI and Data Officer proof pointAn example provided: The standard used for email messages is known as RFC-822 Explains the use of headers, plain text, and HTML. All this is not visible to the user. Attackers take advantage of this by embedding instructions in messages that are invisible to humans but completely readable by an AI agent. When AI processes text, embedded instructions get executed unintentionally. This may result in the deletion of data or may alter or corrupt the system’s behavior. There doesn’t seem to be anything wrong with legacy filters looking for malware or malformed links.

    AI agent phishing: Proofpoint’s new defense Daniel Rapp, Chief AI and Data Officer proof point,proof point

    “In recent attacks we are seeing cases where the HTML and plain text versions are completely different,” Rapp said. “The email client renders the HTML version while there is an instant injection in invisible plain text that can be picked up and potentially acted upon by AI systems.”

    There are two reasons why this strategy has proven effective: First, iIf the AI ​​assistant has access to the inbox, it can automatically take action on emails as they arrive. Second, Rapp said the verbose nature of AI agents makes them vulnerable to phishing and other social engineering tricks. A person may think twice about sending money to a Nigerian bank account. An AI agent can blindly follow orders to do this.

    What differentiates the Proofpoint approach is that the company scans the emails before they reach the inbox. This has been practiced a lot. The company scans 3.5 billion emails every day, one third of the global total. Additionally, it scans around 50 billion URLs and 3 billion attachments daily. This is done inline, that is, while the email is traveling from the sender to the recipient.

    “We have placed traceability capabilities directly into the delivery path, which means latency and efficiency are critical,” Rapp said.

    This required level of speed is accomplished by training small AI models specifically on detection based on examples and foundational knowledge of larger language models (LLMs). For example, OpenAI GPT-5 is expected to be 635 billion parametersIt is not possible to use this amount of data for every email. Proofpoint has refined its models to approximately 300 million parameters. It distills and compresses its models to achieve low-latency, in-line performance without sacrificing detection fidelity. It updates those models every 2.5 days so that they are able to interpret message intent more effectively than just scanning indicators. This way, it detects hidden quick injections, malicious instructions, and other AI exploits before delivery.

    “By stopping attacks before delivery, Proofpoint prevents user compromise and AI exploitation,” Rapp said. “Our secure email gateway can see emails and stop threats before they reach the inbox.”

    Furthermore, Proofpoint uses an ensemble detection architecture. Instead of relying on a single detection mechanism, it combines hundreds of behavioral, reputational, and content-based signals to avoid attack vectors that could outweigh one method.

    AI changes the security game

    AI agents are being introduced into enterprise and consumer scenarios. Unfortunately, the rush to capitalize on AI’s potential often pushes security into an afterthought. Bad people know this. They are AI-enabling their cyber crime techniques and technologies to perfect the art of phishing for the AI ​​agent era.

    “Security tooling must evolve from detecting known bad indicators to interpreting the intent of humans, machines, and AI agents,” Thieman said. “Approaches that identify malicious instructions or manipulated pre-delivery signals, ideally using distilled AI models for low-latency inline security, address a critical gap in security today.”

    Proofpoint is ahead of the pack with these capabilities. Other cybersecurity vendors are expected to follow suit in the coming months. However, by that time, what other AI-generated threats will emerge?

    From articles on your site

    Related articles on the web

    Agent defense phishing Proofpoints
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Article‘Clinical-grade AI’: A catchy new AI term that doesn’t mean anything
    Next Article Do you log into X with a security key? Renominate it by November 10th – otherwise
    PineapplesUpdate
    • Website

    Related Posts

    AI/ML

    Forget fine-tuning: SAP’s RPT-1 brings ready-to-use AI to business tasks

    November 4, 2025
    AI/ML

    ClickUp adds new AI assistant to better compete with Slack and Notion

    November 4, 2025
    AI/ML

    How to Prepare Your Company for a Passwordless Future – in 5 Steps

    November 4, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    I tried the only agentive browser that runs native AI – and found only one downside

    November 7, 2025

    Get 4 Free iPhone 17 or Galaxy S25 Phones from T-Mobile Right Now – Here’s How

    November 7, 2025

    She has 3 secrets to doubling the revenue of your mom’s business

    November 7, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.