The rising AI economy is bringing a new type of cybercrime. Cybercriminals are scamming AI firms by signing up for new accounts to steal tokens via computing power. The problem is getting worse, according to Patrick Collison, CEO of payment behemoth Stripe. The token hackers now amount for one in every six new customer subscriptions.
Experts said that the threat actors steal the tokens to later sell them on the dark web. ‘Token pilfering’ has plagued the cybersecurity world and is becoming quite expensive for AI startups to give free trials to potential customers.
It is not new for hackers to attack startups. With the AI economy rising, it has created fractures for hackers because with traditional software trials, a registration for an AI firm brings valuable tokens for compute power that hackers can sell later.
The most neglected subject in AI is token theft. Because they are using tokens at machine speed, these attackers can swiftly accrue enormous consumption bills that they never plan to pay and burn inference costs. This is one of the most frightening aspects of that.
In order to use the tokens for purposes unrelated to what the company is delivering or to resell them, token theft sometimes involves thieves creating many accounts at an AI company and across multiple firms. They always vanish after using up all of the tokens; Sands compared this swindle to those who "dine and dash" at restaurants.
The problem surfaces as the crooks use agents to steal the tokens in minutes. Unlike a traditional software company, the cybercrime happens too fast for the organization to address the issue.
It is hell for AI firms who want to give out free trials to get more new users. Typically, it costs nothing for a firm to give out free trials on a temporary basis, but for AI firms, the customer-acquisition costs can go up to $500 due to scammers abusing the startup policies of giving out free tokens for trial accounts.
The token epidemic has created problems for startups. Few have stopped free trials, but it has affected their growth as it shuts down the opportunities to get new customers.
Luckily, one solution exists. According to Stripe, there exists a product called Radar that works as a default fraud detector in the credit card payment network, adapts tools, and helps clients find and block token fraud.
Software provider Ivanti has released security updates for a newly identified vulnerability in its Endpoint Manager Mobile (EPMM) platform after confirming that the flaw has already been used in limited zero-day attacks.
The vulnerability, tracked as CVE-2026-6973, has been classified as high severity. According to Ivanti, the issue is caused by improper input validation, which refers to a weakness in how an application processes and checks incoming data before handling a request. If exploited successfully, the flaw could allow a remote attacker with administrator-level access to run arbitrary code on vulnerable systems.
Ivanti stated that the vulnerability affects EPMM version 12.8.0.0 and earlier releases. To reduce exposure, the company has issued patched versions including EPMM 12.6.1.1, 12.7.0.1, and 12.8.0.1. The company is also advising customers to review accounts with administrative privileges and rotate credentials where necessary, particularly in environments where earlier compromise activity may have occurred.
In its advisory, Ivanti said the exploitation activity observed so far appears to be limited in scope and requires valid administrator authentication in order to succeed. The company added that it has not identified active exploitation involving the additional vulnerabilities disclosed alongside CVE-2026-6973.
Ivanti also clarified that the issue impacts only the on-premises version of Endpoint Manager Mobile. The company said the flaw does not affect Ivanti Neurons for MDM, which is its cloud-based endpoint management platform. Other products, including Ivanti EPM and Ivanti Sentry, were also listed as unaffected.
Data published by internet monitoring organization Shadowserver Foundation currently shows more than 850 internet-accessible IP addresses associated with Ivanti EPMM deployments. Most of the exposed systems appear to be located in Europe, followed by North America. However, there is still no public visibility into how many of those servers have already installed the latest patches.
Alongside the actively exploited flaw, Ivanti disclosed fixes for four additional high-severity vulnerabilities identified as CVE-2026-5786, CVE-2026-5787, CVE-2026-5788, and CVE-2026-7821. According to the company, these flaws could potentially be used to obtain administrator access, impersonate registered Sentry hosts to receive valid certificate authority-signed client certificates, invoke unauthorized methods, or gain access to restricted information stored within affected environments.
The company stated that it currently has no evidence showing these four vulnerabilities have been exploited in real-world attacks. Ivanti also noted that CVE-2026-7821 affects only organizations using Apple Device Enrollment configurations.
The latest disclosure follows earlier security incidents involving Ivanti EPMM earlier this year. In January, the company disclosed two separate code-injection vulnerabilities, tracked as CVE-2026-1281 and CVE-2026-1340, which were also exploited as zero-days against what Ivanti described at the time as a very limited number of customers.
Ivanti now says customers who followed its earlier recommendation to rotate credentials after the January incidents are likely to face a significantly lower risk of exploitation from CVE-2026-6973. The guidance reflects a growing concern within the cybersecurity industry that attackers often attempt to reuse stolen administrative credentials across multiple intrusion campaigns.
The issue also drew attention from the U.S. Cybersecurity and Infrastructure Security Agency earlier this year. In April, the agency instructed federal civilian agencies to secure vulnerable systems against attacks involving CVE-2026-1340 within four days after adding the flaw to its Known Exploited Vulnerabilities catalog.
Ivanti products have repeatedly appeared in incident response investigations over the last several years, particularly because endpoint and device management platforms typically operate with elevated privileges across enterprise networks. Security agencies and researchers have warned that these systems remain attractive targets for threat actors seeking broad administrative control over organizational infrastructure.
According to data previously published by CISA, 33 Ivanti vulnerabilities have been publicly identified as exploited in the wild, including 12 that were also linked to ransomware-related activity.
Ivanti says it currently serves more than 40,000 customers worldwide through a partner network consisting of over 7,000 organizations.
Project Eleven, a quantum security firm, published a report that said these quantum computers, even one, is powerful enough to hack the elliptic curve digital signatures securing Ethereum, Bitcoin, and other big blockchains. Experts say they won’t exist beyond 2033, and may end soon by 2030. The window for action is closing fast. According to the report, “Migration to quantum-resistant cryptography is no longer optional but imperative for any blockchain system expected to be trusted and secure into the future."
Recent innovations have significantly lowered the hardware bar needed to launch such attacks. A breakthrough Google paper said that breaking the elliptic curve cryptography threshold could be achieved within 1,200 logical cubits, and less than 90 minutes of computing time on a supercomputing hardware.
Google has put a Q-Day (like D-day) at 2032. Project Eleven’s research has decreased the timeline by two years: 2030. The report estimates that 6.9 million Bitcoin (one third of the total estimated supply) have already been leaked on-chain, exposed to the potential quantum attack. For ETH, exposure is more, with over 65% of all ETH held in quantum-exposed addresses.
The public ledgers and bearer-instruments offer no security. Blockchains has no scam department, no redressal platform for stolen funds, and no chargeback measures. If a quantum hacker recovers a private key and steals money, the loss is permanent. The transition problem is further fouled by slow-moving blockchain governance.
What makes blockchains particularly vulnerable, the report explains, is that their public ledgers and bearer-instrument design offer no safety net. Unlike a bank, a blockchain has no fraud department, no chargeback mechanism, and no way to reverse a forged transaction. Once a quantum attacker recovers a private key and drains a wallet, the loss is permanent.
Bitcoin SegWit upgrade took more than two years to complete whereas ETH’s transition of proof stake took around 6 years to build. Quantum migration reaches the most basic layer of any blockchain mechanism.
The tech world has already started moving. More than half of web traffic (human) is currently post-quantum encrypted, Cloudflare data from December 2025 said.
The digital asset industry lacks preparedness. Crypto developers are suggesting various proposals but these plans will take years to execute while the threat is already brushing businesses and users.
"The internet has already moved," the report added. "The digital asset industry—which arguably has more at stake because blockchains directly protect bearer value with the exact cryptographic primitives that quantum computers threaten—has barely started."
Artificial intelligence platform Hugging Face has launched a dedicated app marketplace for its Reachy Mini desktop robot, opening robotics development to a much wider audience beyond engineers and programmers.
The new Reachy Mini App Store arrives less than a year after the company introduced the low-cost robot in July 2025 following its acquisition of robotics startup Pollen Robotics. Unlike traditional robotics systems that often require technical expertise and expensive hardware, Reachy Mini was designed as a small desktop robot that ordinary users can experiment with at home or in workplaces.
The store already contains more than 200 applications created by community members. Owners of the robot can install these apps without paying additional fees. At present, developers cannot monetize their creations, although Hugging Face says the system may support paid apps later because the platform is built on its existing “Spaces” infrastructure for hosting AI applications.
According to Hugging Face CEO Clément Delangue, the company’s main objective is to remove the technical barrier that has historically made robotics inaccessible to most people. He explained that users without coding or engineering experience are now building working robot applications in less than an hour using AI-powered tools.
A major obstacle in robotics has long been the shortage of large public datasets. While large language models improved rapidly using enormous collections of publicly available software code from platforms such as [GitHub], robotics-specific programming data remains far more limited. This has traditionally made it difficult for AI systems to understand how physical machines operate or interact with hardware components.
To address this problem, Hugging Face developed a system that allows users to describe robot behaviors in normal language instead of writing complex code manually. For example, a user can simply instruct the robot to wave when greeted. An AI agent then generates the necessary code, checks whether it works within the robot’s hardware limitations, and prepares the application automatically.
The company says the platform supports multiple AI models rather than relying on a single provider. Developers can use Hugging Face’s own “ML Intern” tool or connect external models including GPT-5.5, Claude Opus 4.6, Gemini Live, Mini Max GM5, Kimmy 2.6, and Deep Sig V4 Pro. Official conversation-based apps currently use OpenAI Realtime and Gemini Live for real-time interaction.
Hugging Face argues that these higher-level software abstractions substantially reduce the amount of time needed to build robotics applications. Tasks that previously required weeks of integration work can now reportedly be completed within minutes.
The Reachy Mini itself is positioned as an affordable alternative to commercial robotics platforms. The company noted that robots from firms such as Boston Dynamics can cost tens of thousands of dollars, while some competing Chinese systems begin at more than $1,900.
Reachy Mini is available in two versions. The Reachy Mini Lite costs $299 plus shipping and connects to an external computer through USB for processing. The wireless edition costs $449 plus shipping and includes built-in computing hardware using a Raspberry Pi CM4 alongside Wi-Fi support.
Delangue said approximately 10,000 units have already been sold, including 3,000 purchases within the past two weeks alone. Hugging Face expects another 1,000 robots to ship within the next month.
People who do not own the robot can still experiment with the platform through a browser-based simulator that recreates the robot in a virtual 3D environment. Users can also duplicate existing apps through a feature known as “forking” and then modify them using AI instructions, such as changing a robot’s responses into another language.
The App Store forms part of Hugging Face’s broader “Le Robot” initiative launched in 2024 to publish open-source robotics code, tutorials, and hardware resources online. Unlike developer-focused repositories, the Reachy Mini App Store was designed specifically for non-technical users and hobbyists.
More than 150 creators have already contributed applications to the store, many without previous robotics experience. One example highlighted by the company involved 78-year-old retired marketing executive Joel Cohen, who has no technical training and is colorblind. Despite taking two weeks to assemble his Reachy Mini Lite, a process that normally requires only a few hours, Cohen used AI tools to create a robot assistant for CEO discussion groups held over Zoom. The system greets participants by name, verifies claims during discussions, summarizes conversations, and challenges shallow responses in real time.
Other applications developed by the community include a chess-playing robot that jokes about user mistakes, a productivity assistant that detects phone usage, a language-learning companion that corrects pronunciation, and a Formula 1 race commentator that narrates races live.
Delangue also described creating his own office receptionist application in under two hours. The system uses facial recognition to identify visitors, greet them, ask whom they are meeting, and automatically send notifications to employees.
According to Delangue, developing robotics software previously required deep specialization and months of work for people outside the robotics industry. Hugging Face believes combining low-cost hardware with AI agents capable of generating code could reshape how ordinary users interact with robots.
The company says its longer-term goal is to make robotics resemble the personal computer and smartphone markets, where hardware becomes widely available and software creation is no longer restricted to technical specialists.
Cybersecurity entered 2026 under stress to deploy AI tech while building foundations for a quantum future. Cybersecurity experts have to defend against advanced AI and hybrid attacks while facing talent scarcity, a rapidly shifting threat scenario, and rising operational challenges.
It is the first time that hackers have access to the same advanced enterprise-level tech that security experts are using to defend their digital assets.
Organizations are in need of the transformational advantage that Quantum computing promises, however, it also risks affecting the cryptographic infrastructure that protects today’s digital world. Worse, cyber attackers are getting together and outbeating experts.
Like experts, threat actors don’t mind playing the long game either, they gain initial access and stay hidden inside systems for longer periods of time. When the right opportunity arrives, they move laterally and hack important data that can affect operations, cause financial damage, and tarnish reputations.
So, what are these four key areas that businesses and users need to address or stay safe from?
As per the ICS2 2025 report, 69% respondents suffered multiple cybersecurity breaches due to skill gaps. This is due to various factors such as budget constraints, misalignment in academia, and high enterprise demand.
Hackers use GenAI to advance their attacks, scaling, and escape security experts. This reactive cycle delays response times, and gives just basic protection. What businesses need today is Continuous Threat Exposure Management (CTEM) approach that offers real-time visibility before flaws can be exploited. But the success depends on AI-based risk prioritization.
Reliability is the new attack vector. Deepfakes have plagued every digital aspect of human life. Traditional measures fail to address content due to AI, therefore AI-based protection is needed. Adaptive deepfake systems can address identity workflows and respond immediately to threats, flagging malicious activity and capturing attacks with detailed metadata for research and audit work.
Quantum computing is making strides in applicability; if sufficiently advanced, the systems can break public-key cryptographic systems in ransomware attacks such as RSA, where hackers extort millions. Hackers are already using the “harvest now, decrypt later” approach, stealing coded data with no promise of returning it.
Thus, the National Institute of Standards and Technology (NIST) have advised to adopt post-quantum cryptography (PQC) and tracking quantum-vulnerable assets.