The Invisible Perimeter: Identity, AI, and Supply Chain Risk
January was defined by the exploitation of authenticated access, a trend where attackers no longer try to break into the house, but instead trick users and AI agents into opening the door. From the subversion of identity platforms like LinkedIn to the exploitation of “unpatched” legacy systems in the heart of Europe’s critical infrastructure, the message is clear that the perimeter is now invisible and trust is the new zero day.