According to a recent LinkedIn post from Token Security, the company is using RSA Conference 2026 to spotlight security risks in the rapidly emerging Model Context Protocol, or MCP, used for LLM-to-system connectivity. The post centers on a session led by Ariel Simon titled “MCPwned: MCP RCE Vulnerability Leads to Azure Takeover,” which focuses on an MCP remote code execution issue.
Claim 30% Off TipRanks
- Unlock hedge fund-level data and powerful investing tools for smarter, sharper decisions
- Discover top-performing stock ideas and upgrade to a portfolio of market leaders with Smart Investor Picks
The LinkedIn post indicates that Simon’s live research explored how an RCE vulnerability in the official Azure MCP server could allow attackers to execute code on the MCP server and harvest cloud credentials. It further suggests that such a chain could enable adversaries to take over Azure environments, positioning MCP servers as a growing attack surface as AI agents gain direct access to enterprise infrastructure.
According to the post, the session was framed not only around the risk but also around remediation approaches for securing MCP deployments. The content mentions practical guidance on authentication, authorization, least-privilege enforcement and governance, and directs readers to a full technical breakdown via an external link, suggesting the company is investing in thought leadership on AI infrastructure security.
The post also notes that Token Security is present at RSA Conference with a booth, inviting attendees to discuss securing AI agents and MCP infrastructure. For investors, this visibility at a major cybersecurity conference, combined with research into emerging AI-related attack surfaces, may indicate a strategic focus on next-generation cloud and AI security, potentially supporting future demand for the company’s offerings in a rapidly evolving market.

