{"version":"1.0","provider_name":"EDC&#039;s Blog","provider_url":"https:\/\/www.edcus.com\/blog","author_name":"Diana Corona","author_url":"https:\/\/www.edcus.com\/blog\/author\/dcorona\/","title":"From the trenches of AI: The breach no one saw coming \u2014 and the security lesson every mover can't afford to ignore - EDC&#039;s Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"OZW7LsQkAA\"><a href=\"https:\/\/www.edcus.com\/blog\/2026\/05\/04\/the-ai-built-to-stop-hackers-got-hacked\/\">From the trenches of AI: The breach no one saw coming \u2014 and the security lesson every mover can&#8217;t afford to ignore<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.edcus.com\/blog\/2026\/05\/04\/the-ai-built-to-stop-hackers-got-hacked\/embed\/#?secret=OZW7LsQkAA\" width=\"600\" height=\"338\" title=\"&#8220;From the trenches of AI: The breach no one saw coming \u2014 and the security lesson every mover can&#8217;t afford to ignore&#8221; &#8212; EDC&#039;s Blog\" data-secret=\"OZW7LsQkAA\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.edcus.com\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.edcus.com\/blog\/wp-content\/uploads\/2026\/05\/5-AI_got_hacked_size2.jpg","thumbnail_width":1140,"thumbnail_height":769,"description":"Last week I wrote about Claude Mythos Preview \u2014 Anthropic&#8217;s groundbreaking new AI model and the Project Glasswing initiative designed to put its extraordinary cybersecurity capabilities to work for defenders rather than attackers. The response was tremendous, and the conversations it sparked reinforced something I believe deeply: our industry is genuinely curious about AI, and [&hellip;]"}