David Bombal

#569: Why Vibe Hacking Is a Big Cybersecurity Threat in 2026

Mar 30, 2026
Pascal Geenens, Radware researcher and cybersecurity expert behind the Global Threat Analysis Report, explains the 2025–2026 shift where AI supercharges attackers. He breaks down vibe hacking, agentic AI and MCP risks. Short takes cover AI-driven DDoS resurgence, vulnerable APIs, indirect prompt injection, and how automation hands novices powerful attack tools.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

MCP Gives AI Agents Practical Attack Capabilities

  • MCP (Model Context Protocol) gives agents 'hands' by exposing tool servers that run scanners and exploits.
  • Pascal Geenens notes MCP-linked toolsets allow agents to run nmap, curl, and pen-test tools remotely, enabling end-to-end automation.
ADVICE

Avoid Unchecked Offline Models For Sensitive Tasks

  • Prefer guarded cloud models and be cautious with offline open models when you need auditability.
  • Pascal Geenens warns open offline models (e.g., DeepSeek-R1) lack oversight and can be used anonymously for attacks.
INSIGHT

DDoS Is Back At Multi‑Terabit Scale

  • Volumetric DDoS returned strongly in 2025 with multi-terabit capability rented via DDoS-as-a-service.
  • Pascal Geenens links 30 Tbps proof-of-capability bursts to botnets like Isuru and Kimwolf rented to customers for short attacks.
Get the Snipd Podcast app to discover more snips from this episode
Get the app