The control plane for every AI agent — identity, policy enforcement, compliance, and runtime governance at enterprise scale.
ADT. Comcast. SAP. Medtronic. Best-in-class stacks — all breached anyway. See exactly what failed.
| Company | What Happened | Impact | How RuntimeAI Closes the Gap | Severity |
|---|---|---|---|---|
| Zara / Inditex | ShinyHunters used an API key Inditex gave a vendor (Anodot) and never revoked — 11 months stale, still working | 197K customer records | NHI inventory + auto-decommission of dormant vendor tokens. Bulk-read kill switch on baseline drift. | Critical |
| Canvas / Instructure | ShinyHunters stole 275M student records — billions of private messages, 9,000 schools — ransom paid, second attack confirmed | 275M records · 9K schools | PII tokenization before storage. Anomalous bulk-read detection. PQ-signed audit for HIPAA/FERPA-grade forensics. | Critical |
| Palo Alto Networks | Zero-day RCE in PAN-OS firewall OS actively exploited before patch — attackers pivoting through perimeter controls into enterprise networks | Perimeter bypass | KYA agent identity independent of perimeter. PQ transit encryption. Behavioral anomaly detection at the workload, not the edge. | Critical |
| Mercor / LiteLLM | Supply chain attack on AI infrastructure proxy — malicious package hijacked LLM traffic across enterprise deployments | AI infra supply chain | LLM Broker validates every model call with KYA-scoped credentials. Egress policy blocks proxy hijack to attacker C2. | Critical |
| Vercel / Context AI | OAuth pivot attack — compromised AI tool credentials used to escalate into production CI/CD pipelines | AI tool OAuth chain | Bot-CA cert required at MCP Gateway. KYA scope-minimized OAuth grants. Cross-tool privilege chains broken at the boundary. | Critical |
| PocketOS | Cursor/Claude agent deleted entire production database + all backups in 9 seconds — no guardrails, no rollback | Total data loss | Kill Switch sub-100ms agent termination. Flow Enforcer rejects destructive DB ops outside declared scope. | Critical |
| SAP npm | Self-propagating worm in 4 official packages stole CI/CD secrets & cloud keys | 570K weekly downloads | Model + package provenance map. Loader sandbox blocks credential store access. Egress allowlists stop the worm phoning home. | Critical |
| ADT | AI-assisted vishing compromised Okta SSO — 5.5M customer records exposed | 5.5M customers | Behavioral anomaly detection on help-desk reset flows. Multi-factor agent identity. Override+halt audit on session reset. | High |
| Roblox | 610K accounts stolen via AI-generated infostealer malware; 50M credential dump | 610K+ accounts | Endpoint agent governance. PII tokenization at storage. Anomalous credential-export detection at the data plane. | High |
| Medtronic | ShinyHunters breached corporate IT; 9M+ PII records claimed — 6 days before detection | 9M records | Audit Black Box cuts detection from days to seconds. PII tokenization makes the stolen records useless ciphertext. | High |
| Comcast | $117.5M settlement from 2023 CRM breach — up to 30M customers eligible for compensation | 30M customers | CRM-tier KYA scoping. Bulk-export rate gate. PQ-signed audit trail makes regulatory exposure provable, not estimated. | High |
| Amtrak | CRM/Salesforce-related attack exposed 2.1M–9.4M customer records including travel history | Up to 9.4M records | SaaS-tier NHI inventory. OAuth scope minimization for Salesforce integrations. Row-level filters at the data proxy. | High |
Mercor. Vercel. PocketOS. SAP. ADT. Roblox. Supply chain attacks, rogue agents, OAuth pivots, vishing — every one detectable and blockable at the RuntimeAI control plane before damage is done.
No credit card · 30-day trial · Full platform access
Generic IAM and security tools weren't built for AI agents. RuntimeAI is — built from the ground up.
Incident analysis, threat research, and governance deep-dives for the teams shipping autonomous agents.
Every Wednesday: the AI security incidents your team needs to know, with actionable RuntimeAI context.
Work email only — no personal email domains (Gmail, Yahoo, Outlook).
From identity to incident response — everything you need to run AI at enterprise scale.
Built for the most regulated industries. Compliance isn't an add-on — it's the foundation.
RuntimeAI's Kill Switch stops a single agent — or your entire fleet — in milliseconds, not minutes. Across MCP servers, non-human identities, and cloud workloads. One click. Reversible. Audited.
Targets MCP servers, NHIs, and cloud workloads from one console — no four-tool workflow, no waking up four oncalls.
See it in a demo →* p50 in production, intra-region traffic. Cross-region and WAN paths will be higher.
A personalized walkthrough of how RuntimeAI secures your specific AI agent deployment.