AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Anthropic Tool Access, EU App Bypasses, and Active Zero-Days

This episode explores how access control is breaking down across AI systems, consumer apps, and vulnerability management, from leaked AI tooling and bypassed EU verification apps to actively exploited Windows zero-days and growing strain on the NVD.

Access is getting easier without anything new being broken.

This week’s stories are about systems stepping into trust that already exists and turning it into usable access.

First, that shows up in identity and trust decisions. An AI voice phishing platform like ATHR makes impersonation a one-person operation, automating calls that used to require real interaction. The EU age verification app can be bypassed in minutes because it trusts the device instead of the person. An Anthropic MCP design flaw shows how a simple integration decision can turn into command execution across thousands of systems. Even tightly controlled tools, like Anthropic’s reported Mythos platform, can leak access almost immediately once they move through third-party environments. Trust is granted early, and once it is, the system turns it into access.

Then, exposure turns into access quickly. Recently disclosed Windows zero-days are already being used in active attacks to reach SYSTEM-level privileges. Once attackers have any foothold, these bugs let them upgrade it into something persistent and much harder to remove. The gap between disclosure and exploitation is no longer where defenders have time to react.

Finally, the ecosystem determines who can act on access faster. NVD cutbacks mean defenders have less centralized context to understand which vulnerabilities actually matter, forcing teams to work from fragmented signals. Even when operations like PowerOFF disrupt DDoS-for-hire services, that ecosystem tends to rebuild quickly, keeping attack capability available on demand. New Coast Guard cybersecurity rules highlight a different issue, where compliance assumes access is controlled and monitored in ways that may not reflect how systems actually behave. Access is shaped by who can see it clearly and act on it first.

Across all of this, the failure is consistent. Systems are making trust decisions too early, and once they do, they handle the rest at scale.

Trust becomes access. Exposure becomes privilege. And in most cases, attackers are not outrunning controls. They’re working through them.

Security Headlines:


Sean McMillan Headshot

About the speaker, Sean McMillan

Community Manager

Sean McMillan is Community Manager at Bishop Fox, focused on making complex security topics easier to understand and more interesting to follow. He holds a bachelor’s degree in Mass Communication and Media Studies from Arizona State University and brings over a decade of experience in podcasting, live hosting, and audience engagement. As host of Initial Access, he works with practitioners to explore how real-world attacks actually happen.


Bfx25 Sarah Muriel

About the speaker, Sarah Muriel

Attack Surface Analyst, Cosmos

Sarah Muriel is an Attack Surface Analyst for Cosmos and a certified Open Source Intelligence professional. She likes focusing her skills to find the things that make organizations vulnerable before anyone else can.

In her spare time she participates in OSINT focused CTFs and develops retro-style websites. She’s also fairly active in the cybersecurity community, being part of the organization team for one of Mexico’s top conferences.


Bfx25 Thomas Wilson Bio

About the speaker, Thomas Wilson

Senior Red Team Operator

Thomas Wilson is a senior red team operator at Bishop Fox and a musician. From IDEs to DAWs, he is as at home on his own computer as he is on someone else's. You can usually find him at the local card shop slinging spells, up on stage blasting tunes, or with his eyes glued to his monitor for hours at a time (thank goodness for blue light filtering lenses).


Dillon Sparks Bio Photo

About the speaker, Dillon Sparks

Senior Operator

Dillon Sparks is a Senior Operator at Bishop Fox, serving on the Threat Enablement Team with a focus on Attack Surface Intelligence and Emerging Threat Analysis. He applies deep expertise in offensive security, network exploitation, and systems analysis to help organizations understand and mitigate real-world risk across complex software and infrastructure environments.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.