{"id":57810,"date":"2024-12-04T00:00:00","date_gmt":"2024-12-04T00:00:00","guid":{"rendered":"urn:uuid:8c2b6a12-3acb-f67d-f3c5-193a1942952c"},"modified":"2024-12-04T00:00:00","modified_gmt":"2024-12-04T00:00:00","slug":"the-road-to-agentic-ai-exposed-foundations","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-road-to-agentic-ai-exposed-foundations\/","title":{"rendered":"The Road to Agentic AI: Exposed Foundations"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/Algentic:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/Algentic.png\" class=\"ff-og-image-inserted\"><\/div>\n<p><b>Report highlights:<\/b><\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Retrieval augmented generation (RAG) enables enterprises to build customized, efficient, and cost-effective applications based on private data. However, research reveals significant security risks, such as exposed vector stores and LLM-hosting platforms, which can lead to data leaks, unauthorized access, and potential system manipulation if not properly secured.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Security issues such as data validation bugs and denial-of-service attacks are prevalent across RAG components. This is compounded by their rapid development cycle, which makes tracking and addressing vulnerabilities challenging.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Research identified 80 exposed llama.cpp servers, 57 of which lacked authentication. Exposed servers were concentrated in the United States, followed by China, Germany, and France, reflecting global adoption with varying levels of security practices.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Beyond authentication, enterprises must implement TLS encryption and enforce zero-trust networking to ensure that generative AI systems and their components are shielded from unauthorized access and manipulation.<\/span><\/li>\n<\/ul>\n<p>\u201cMove fast and break things\u201d seems to be the current motto in the field of AI. Ever since the introduction of ChatGPT in 2022, it seems everyone is jumping on the bandwagon. In some fields, people have been happy to just use OpenAI&#8217;s offerings, but many enterprises have specialized needs. As <a href=\"https:\/\/www.nytimes.com\/2024\/11\/15\/podcasts\/crypto-congress-hbd-chatgpt-what-social-media-platform-should-i-be-on.html\" target=\"_blank\" rel=\"noopener\">Nick Turley<\/a>, OpenAI&#8217;s head of product, recently said, LLMs are a \u201ccalculator for words\u201d and this new technology has opened up many possibilities for enterprises. However, some engineering is needed to use this \u201cword calculator\u201d effectively and while we wait for proper <a href=\"https:\/\/www.deeplearning.ai\/the-batch\/how-agents-can-improve-llm-performance\/?ref=dl-staging-website.ghost.io\" target=\"_blank\" rel=\"noopener\">agentic AI systems<\/a>, the current technology of choice is retrieval augmented generation (RAG).<\/p>\n<p>RAG needs a few ingredients to run. It needs a database of text chunks and a way of retrieving them. We usually use a vector store for this, which saves the text and a series of numbers that helps us find the most relevant text chunks. With these &nbsp;and an appropriate prompt, we can often answer questions or compose new texts that are based on private data sources and are relevant for our needs. Indeed, RAG is so effective that the most powerful large language (LLM) models are not always needed. To save costs and improve response time, we can use our own servers to host these smaller and lighter LLM models.<\/p>\n<p>As an analogy, the vector store is like a very helpful librarian who not only chooses the relevant books but also highlights the relevant passages. The LLM is then the researcher who takes these highlighted texts and uses them to write the paper or answer the question. Together, they form a RAG application.<\/p>\n<p>Vector stores are not completely new, but have been seeing a <a href=\"https:\/\/www.forbes.com\/sites\/adrianbridgwater\/2023\/05\/19\/the-rise-of-vector-databases\/\" target=\"_blank\" rel=\"noopener\">renaissance<\/a> over the last two years. While there are many hosted solutions like Pinecone, there are also self-hosted solutions like <a href=\"https:\/\/www.trychroma.com\/\" target=\"_blank\" rel=\"noopener\">ChromaDB<\/a> or Weaviate (<a href=\"https:\/\/weaviate.io\/\" target=\"_blank\" rel=\"noopener\">https:\/\/weaviate.io)<\/a>. They allow a developer to find text chunks similar to the input text, such as a question that needs to be answered.<\/p>\n<p>Hosting one\u2019s own LLM does require a decent amount of memory and a good GPU, but this is not anything that a cloud provider can provide. For those with a good laptop or PC, <a href=\"https:\/\/lmstudio.ai\/\" target=\"_blank\" rel=\"noopener\">LMStudio<\/a> is a popular pick. For enterprise use, <a href=\"https:\/\/github.com\/ggerganov\/llama.cpp\" target=\"_blank\" rel=\"noopener\">llama.cpp<\/a> and <a href=\"https:\/\/ollama.com\/\" target=\"_blank\" rel=\"noopener\">Ollama<\/a> are often the first choice. All of these have seen the sort of rapid development we have rarely seen, so it should be no surprise that some bugs have crept in.<\/p>\n<p>Some of these bugs in RAG components are in typical data validation bugs, such as <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-37032\" target=\"_blank\" rel=\"noopener\">CVE-2024-37032<\/a> and <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-39720\" target=\"_blank\" rel=\"noopener\">CVE-2024-39720<\/a>. Others lead to denial of service, like <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-39720\" target=\"_blank\" rel=\"noopener\">CVE-2024-39720<\/a> and <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-39721\" target=\"_blank\" rel=\"noopener\">CVE-2024-39721<\/a>, or leaks the existence of files, like <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-39719\" target=\"_blank\" rel=\"noopener\">CVE-2024-39719<\/a> and <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-39722\" target=\"_blank\" rel=\"noopener\">CVE-2024-39722<\/a>. The list goes on. Less is known about llama.cpp, but <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-42479\" target=\"_blank\" rel=\"noopener\">CVE-2024-42479<\/a>&nbsp;was found this year, while <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-34359\" target=\"_blank\" rel=\"noopener\">CVE-2024-34359<\/a> affects the Python library using llama.cpp. Perhaps less is known about llama.cpp due to its blistering release cycle. Since its inception in March 2023, there have been over 2,500 releases, or around four a day. With a moving target like that, it is hard to track its vulnerabilities.<\/p>\n<p>In contrast, Ollama maintains a more leisurely release cycle of only 96 releases since July 2023, about once a week. In contrast, Linux is released every few months and Windows sees new \u201cMoments\u201d every quarter.<\/p>\n<p>The vector store, ChromaDB, has been around since October 2022 and releases roughly every two weeks. Interestingly, there are no known CVEs directly associated with it. Weaviate, another vector store, has also been found to have vulnerabilities (<a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-38976\" target=\"_blank\" rel=\"noopener\">CVE-2023-38976<\/a> and <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-45846\" target=\"_blank\" rel=\"noopener\">CVE-2024-45846<\/a> when used with MindsDB). It has been around since 2019, making it a veritable grandfather of this technology stack but still manages a weekly release cycle. There is nothing stable about any of these release cycles, but it does mean that bugs get patched quickly when found, limiting their exposure time.<\/p>\n<p>LLMs on their own are not likely to fulfill all needs and are only incrementally improving as they run out of public data to train on. The future is likely to be an agentic AI, one that combines LLMs, memory, tools, and workflow into more advanced AI-based systems, as championed by <a href=\"https:\/\/www.deeplearning.ai\/the-batch\/how-agents-can-improve-llm-performance\/?ref=dl-staging-website.ghost.io\" target=\"_blank\" rel=\"noopener\">Andrew Ng<\/a>. Essentially, this is a new software development stack and the LLMs and the vector stores will continue to play a major role here.<br \/>But along this path, enterprises are going to get hurt if they do not pay attention to the security of their systems.<\/p>\n<p>We were worried that in their haste, many developers would expose these systems to the internet and so we searched for instances of some of these RAG components on the internet in November 2024. We focused on the four top components used in RAG systems: llama.cpp, Ollama that hosts LLMs, and ChromaDB and Weaviate, which are vector stores.<\/p>\n<p><b>llama.cpp exposed<\/b><\/p>\n<p>llama.cpp is used to host a single LLM model and is a REST service, i.e., the server communicates to the client with POST requests just as defined by the HTTP protocol. In our testing, there were some fluctuations in the numbers we saw. On the last count, however, we saw 80 exposed servers, and 57 of them did not appear to have any form of authentication. There is a good chance that these numbers are low, and that more servers are better hidden but equally open.<br \/>The models that were hosted on the llama.cpp servers were mainly Llama 3-derived models, followed by Mistral models. Many of these are known jailbroken models, but most were models that are not widely known and were also probably fine-tuned for specific purposes.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/k\/agentic-ai.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our research into Retrieval Augmented Generation (RAG) systems uncovered at least 80 unprotected servers. We highlight this problem, which can lead to potential data loss and unauthorized access. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":57811,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,10938,9520,9509],"class_list":["post-57810","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-artificial-intelligence-ai","tag-trend-micro-research-cloud","tag-trend-micro-research-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Road to Agentic AI: Exposed Foundations 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-road-to-agentic-ai-exposed-foundations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Road to Agentic AI: Exposed Foundations 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-road-to-agentic-ai-exposed-foundations\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-04T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/Algentic:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-road-to-agentic-ai-exposed-foundations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-road-to-agentic-ai-exposed-foundations\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The Road to Agentic AI: Exposed Foundations\",\"datePublished\":\"2024-12-04T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-road-to-agentic-ai-exposed-foundations\\\/\"},\"wordCount\":1084,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-road-to-agentic-ai-exposed-foundations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/the-road-to-agentic-ai-exposed-foundations.png\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Artificial Intelligence (AI)\",\"Trend Micro Research : Cloud\",\"Trend Micro Research : Research\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-road-to-agentic-ai-exposed-foundations\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-road-to-agentic-ai-exposed-foundations\\\/\",\"name\":\"The Road to Agentic AI: Exposed Foundations 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-road-to-agentic-ai-exposed-foundations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-road-to-agentic-ai-exposed-foundations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/the-road-to-agentic-ai-exposed-foundations.png\",\"datePublished\":\"2024-12-04T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-road-to-agentic-ai-exposed-foundations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-road-to-agentic-ai-exposed-foundations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-road-to-agentic-ai-exposed-foundations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/the-road-to-agentic-ai-exposed-foundations.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/the-road-to-agentic-ai-exposed-foundations.png\",\"width\":976,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-road-to-agentic-ai-exposed-foundations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Road to Agentic AI: Exposed Foundations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Road to Agentic AI: Exposed Foundations 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-road-to-agentic-ai-exposed-foundations\/","og_locale":"en_US","og_type":"article","og_title":"The Road to Agentic AI: Exposed Foundations 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-road-to-agentic-ai-exposed-foundations\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-12-04T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/Algentic:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-road-to-agentic-ai-exposed-foundations\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-road-to-agentic-ai-exposed-foundations\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The Road to Agentic AI: Exposed Foundations","datePublished":"2024-12-04T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-road-to-agentic-ai-exposed-foundations\/"},"wordCount":1084,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-road-to-agentic-ai-exposed-foundations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/12\/the-road-to-agentic-ai-exposed-foundations.png","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Artificial Intelligence (AI)","Trend Micro Research : Cloud","Trend Micro Research : Research"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-road-to-agentic-ai-exposed-foundations\/","url":"https:\/\/www.threatshub.org\/blog\/the-road-to-agentic-ai-exposed-foundations\/","name":"The Road to Agentic AI: Exposed Foundations 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-road-to-agentic-ai-exposed-foundations\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-road-to-agentic-ai-exposed-foundations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/12\/the-road-to-agentic-ai-exposed-foundations.png","datePublished":"2024-12-04T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-road-to-agentic-ai-exposed-foundations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-road-to-agentic-ai-exposed-foundations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-road-to-agentic-ai-exposed-foundations\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/12\/the-road-to-agentic-ai-exposed-foundations.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/12\/the-road-to-agentic-ai-exposed-foundations.png","width":976,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-road-to-agentic-ai-exposed-foundations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"The Road to Agentic AI: Exposed Foundations"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=57810"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57810\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/57811"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=57810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=57810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=57810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}