Tile

View full article
Tile
Select a feed to view its content

Loading feed entries...

When Wi-Fi Encryption Fails: Protecting Your Enterprise from AirSnitch Attacks

When Wi-Fi Encryption Fails: Protecting Your Enterprise from AirSnitch Attacks

Cracks in the Bedrock: Agent God Mode

Cracks in the Bedrock: Agent God Mode

Double Agents: Exposing Security Blind Spots in GCP Vertex AI

Double Agents: Exposing Security Blind Spots in GCP Vertex AI

Threat Brief: Recruiting Scheme Impersonating Palo Alto Networks Talent Acquisition Team

Threat Brief: Recruiting Scheme Impersonating Palo Alto Networks Talent Acquisition Team

Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models

Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models

Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox

Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox

That AI Extension Helping You Write Emails? It’s Reading Them First

That AI Extension Helping You Write Emails? It’s Reading Them First

Can AI Attack the Cloud? Lessons From Building an Autonomous Cloud Offensive Multi-Agent System

Can AI Attack the Cloud? Lessons From Building an Autonomous Cloud Offensive Multi-Agent System

Analyzing the Current State of AI Use in Malware

Analyzing the Current State of AI Use in Malware

A Deep Dive Into Attempted Exploitation of CVE-2023-33538

A Deep Dive Into Attempted Exploitation of CVE-2023-33538

Google Cloud Authenticator: The Hidden Mechanisms of Passwordless Authentication

Google Cloud Authenticator: The Hidden Mechanisms of Passwordless Authentication

Boggy Serpens Threat Assessment

Boggy Serpens Threat Assessment

Inside AD CS Escalation: Unpacking Advanced Misuse Techniques and Tools

Inside AD CS Escalation: Unpacking Advanced Misuse Techniques and Tools

Understanding Current Threats to Kubernetes Environments

Understanding Current Threats to Kubernetes Environments

When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications

When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications