Close Menu
    National News Brief
    Wednesday, April 29
    • Home
    • Business
    • Lifestyle
    • Science
    • Technology
    • International
    • Arts & Entertainment
    • Sports
    National News Brief
    Home»Technology

    AI Agent Phishing: Proofpoint’s New Defense

    Team_NationalNewsBriefBy Team_NationalNewsBriefOctober 27, 2025 Technology No Comments5 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Email security has always been a cat-and-mouse game. Viruses are invented, and antivirus software is invented to catalog known viruses and detect their presence in email attachments and URLs. As viruses morphed into more sophisticated forms of malware, cybersecurity tools adapted to be able to scan for and detect these new threats. Phishing became the next arena, giving birth to new tools as well as a whole new category of defense known as security awareness training. Now, the bad guys are attacking AI agents to bypass current security guardrails.

    “AI assistants, copilots, and agents significantly expand the enterprise attack surface in ways that traditional security architectures were not designed to handle,” said Todd Thiemann, a cybersecurity analyst at research firm Omdia.

    Enter a series of AI-based features for Proofpoint Prime Threat Protection that were introduced at the company’s Proofpoint Protect 2025 event in September. They thwart the efforts of hackers to subvert the actions of AI agents by scanning for potential threats before email messages arrive at an inbox.

    Traditional Approach to Email Security

    Most email security tools are designed to spot known bad signals like suspicious links, fake domains that look real, or attachments carrying malware. This approach works well against conventional phishing, spam, and known exploits. But cybercriminals are now going after the many AI assistants and AI agents that have become embedded in the workplace.

    They do this by taking advantage of prompts (questions or commands in text or code form) that guide AI models and AI agents to either produce relevant responses or execute certain tasks. Increasingly, emails carry hidden, malicious prompts that use invisible text or special formatting designed to trick generative AI tools like Microsoft Copilot and Google Gemini into taking unsafe actions, such as exfiltrating data or bypassing security checks.

    “Prompt injections and other AI-targeted exploits represent a new class of attacks that use text-based payloads that manipulate machine reasoning rather than human behavior,” said Thiemann.

    Daniel Rapp, Chief AI and Data Officer at Proofpoint, provided an example: The standard used for email messages known as RFC-822 lays out the use of headers, plain text, and HTML. Not all of this is visible to a user. Attackers take advantage of this by embedding instructions in messages that are invisible to humans but fully readable by an AI agent. When AI processes the text, the embedded instructions are inadvertently executed. This can lead to data being exfiltrated or system behavior being altered or corrupted. Legacy filters looking for malware or malformed links see nothing amiss.

    Daniel Rapp, Chief AI and Data Officer at Proofpoint.Proofpoint

    “In recent attacks we are seeing cases where the HTML and plain text version are completely different,” said Rapp. “The email client renders the HTML version while invisible plain text contains a prompt injection that can be picked up and possibly acted on by an AI system.”

    There are two reasons why this strategy is proving effective: First, if an AI assistant has access to an inbox, it can automatically act on an email the instant it arrives. Second, Rapp said the literal nature of AI agents makes them susceptible to phishing and other social engineering tricks. A human might think twice about sending money to a Nigerian bank account. An AI agent might blindly carry out a command to do so.

    What differentiates the Proofpoint approach is that the company scans emails before they hit inboxes. It’s had plenty of practice. The company scans 3.5 billion emails every day, one third of the global total. In addition, it scans close to 50 billion URLs and 3 billion attachments daily. This is done inline i.e., while the email is traveling from the sender to the recipient.

    “We have placed detection capabilities directly in the delivery path, which means latency and efficiency are critical,” said Rapp.

    This necessary level of speed is accomplished by training smaller AI models specifically on detection, based on examples and the foundational knowledge of a large language model (LLM). For example, OpenAI’s GPT-5 is estimated to have as many as 635 billion parameters. Wading through that amount of data for every email isn’t feasible. Proofpoint has fine-tuned its models down to about 300 million parameters. It distills and compresses its models to attain low-latency, in-line performance without sacrificing detection fidelity. It also updates those models every 2.5 days to be able to effectively interpret the intent of the message itself, not just scan for indicators. In this way, it spots concealed prompt injections, malicious instructions, and other AI exploits before delivery.

    “By stopping attacks pre-delivery, Proofpoint prevents user compromise and AI exploitation,” said Rapp. “Our secure email gateway can see emails and stop threats before they hit the inbox.”

    In addition, Proofpoint uses an ensemble detection architecture. Instead of relying on a single detection mechanism, it combines hundreds of behavioral, reputational, and content-based signals to get around attack vectors that might navigate their way past one method.

    AI Changes the Security Game

    AI agents are being rolled out across the enterprise and consumer landscape. Unfortunately, the rush to capitalize on AI’s potential often relegates security to an afterthought. The bad guys know this. They are AI-enabling their cybercrime techniques and technologies to perfect the art of phishing for the AI agent era.

    “Security tooling must evolve from detecting known bad indicators to interpreting intent for humans, machines, and AI agents,” said Thiemann. “Approaches that identify malicious instructions or manipulative prompts pre-delivery, ideally using distilled AI models for low-latency inline protection, address a significant gap in today’s defenses.”

    Proofpoint is ahead of the pack with the role out of these capabilities. Expect other cybersecurity vendors to follow suit in the coming months. By that time, however, what other AI-borne threat will emerge?

    From Your Site Articles

    Related Articles Around the Web



    Source link

    Team_NationalNewsBrief
    • Website

    Keep Reading

    Sparse AI Hardware Slashes Energy and Latency

    Tech Life – Sharing the road with driverless cars

    Tech Life – A hologram to remember: Pam and Bill’s love story

    Tech Life – The workers in the engine room of big tech

    Sam Altman’s Next High-Wire Act: Getting OpenAI to Make More Money

    Why ENIAC Was a Loom, Not Just a Calculator

    Add A Comment

    Comments are closed.

    Editors Picks

    Putin Launches Mass-Production Of Nuclear Shelters For His People

    November 20, 2024

    North Korea says US must accept its status as a nuclear weapons state | News

    July 29, 2025

    How Businesses Can Actually Make an Environmental Impact

    April 23, 2025

    Biden aides in Middle East in diplomatic push for Syria, Gaza | Syria’s War News

    December 12, 2024

    Canada murders spark calls to label India’s Bishnoi gang a ‘terror’ group | Crime News

    August 8, 2025
    Categories
    • Arts & Entertainment
    • Business
    • International
    • Latest News
    • Lifestyle
    • Opinions
    • Politics
    • Science
    • Sports
    • Technology
    • Top Stories
    • Trending News
    • World Economy
    About us

    Welcome to National News Brief, your one-stop destination for staying informed on the latest developments from around the globe. Our mission is to provide readers with up-to-the-minute coverage across a wide range of topics, ensuring you never miss out on the stories that matter most.

    At National News Brief, we cover World News, delivering accurate and insightful reports on global events and issues shaping the future. Our Tech News section keeps you informed about cutting-edge technologies, trends in AI, and innovations transforming industries. Stay ahead of the curve with updates on the World Economy, including financial markets, economic policies, and international trade.

    Editors Picks

    Starmer’s Collapse Is A Vote Against Policy Failure

    April 29, 2026

    Kris Jenner Denies Recent Facelift Reports

    April 29, 2026

    Kevin Warsh one step closer to becoming Fed chair after Senate committee approval

    April 29, 2026

    Over 1.2m in Lebanon expected to face acute hunger: UN-backed report | Food News

    April 29, 2026
    Categories
    • Arts & Entertainment
    • Business
    • International
    • Latest News
    • Lifestyle
    • Opinions
    • Politics
    • Science
    • Sports
    • Technology
    • Top Stories
    • Trending News
    • World Economy
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us
    Copyright © 2024 Nationalnewsbrief.com All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.