Synack breaks down agentic AI in pentesting, contrasting it with standard LLMs. What's interesting: agents can autonomously chain tools (nmap→hashcat→curl), learn from results, and adapt—going beyond …
Category: Research & Analysis / AI Security
#ai-security#pentesting#agentic-ai#automation#red-team
Educational breakdown of modern phishing tradecraft evolution. What's changed: attackers now use AI to generate fluent, localized content removing the 'bad grammar' tell. Common vectors include urgenc…
Category: Research & Analysis / Social Engineering
#phishing#social-engineering#credential-harvesting#ai-enabled-threats#ato
International Association for Cryptologic Research issued a call for proposals for the next generation of cryptographic hash algorithms. This follows the pattern of previous competitions like SHA-3 se…
Category: Research & Analysis / Cryptography
#cryptography#hash-functions#post-quantum#standards#iacr#nist
Google published research showing Android's AI-driven scam protections outperform iOS. What's interesting: YouGov survey of 5,000 users found Android users 58% more likely to report zero scam texts vs…
Category: Research & Analysis / Mobile Security
#mobile-security#android#ios#scam-protection#ai-security#phishing#google
Leaked Cellebrite briefing reveals which Pixel phones law enforcement can hack. What's interesting: Cellebrite can extract data from Pixel 6, 7, 8, and 9 in unlocked, AFU (After First Unlock), and BFU…
Category: Research & Analysis / Mobile Security
#mobile-security#pixel#cellebrite#grapheneos#forensics#device-encryption
OpenAI released Aardvark, a ChatGPT-5-powered security model that automates bug hunting, patching, and remediation. What's different: it doesn't rely on traditional techniques like fuzzing or SCA—inst…
Category: Research & Analysis / AI Security
#ai-security#openai#aardvark#automated-patching#vulnerability-scanning#chatgpt
Microsoft published analysis of critical GenAI threats facing organizations. What's concerning: 66% of orgs are developing custom GenAI apps, 88% worry about indirect prompt injection, 80% cite data l…
Category: Research & Analysis / AI Security
#ai-security#genai#prompt-injection#microsoft#llm-security#cloud-security
Security tooling and research roundup: (1) New MCP (Model Context Protocol) security scanners released—cisco-ai-defense/mcp-scanner combines YARA rules, LLM-as-judge, and Cisco AI Defense API to scan …
Category: Research & Analysis / Security Tools
#mcp#gitlab#ci-cd#ai-security#security-tools#benchmarking