News
A Taxonomy of Cognitive Security
2+ week, 4+ day ago (242+ words) Home " Cybersecurity " Social Engineering " A Taxonomy of Cognitive Security Last week, I listened to a fascinating talk by K. Melton on cognitive security, cognitive hacking, and reality pentesting. The slides from the talk are here, but'even better'Menton has a long essay…...
A History of Global Hacking " and Where It's Going Next
2+ hour, 29+ min ago (183+ words) Home " Security Bloggers Network " A History of Global Hacking " and Where It's Going Next The post A History of Global Hacking " and Where It's Going Next appeared first on Lohrmann on Cybersecurity. In the midst of recent battles with Iran…...
[un]prompted 2026 - Trajectory-Aware Post-Training Security Agents
21+ hour, 13+ min ago (103+ words) Author, Creator & Presenter: Aaron Brown, Agentic AI Builder, AWS Our thanks to [un]prompted for publishing their Creators, Authors and Presenter's outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations' You Tube Channel. Permalink The post [un]prompted 2026 " Trajectory-Aware…...
Payouts King Takes Aim at the Ransomware Throne
2+ day, 21+ hour ago (1572+ words) Introduction In February 2022, Black Basta emerged as a successor to Conti ransomware and quickly rose to prominence. Black Basta was operational for three years until February 2025 when their internal chat logs were leaked online, exposing the group's inner workings. This…...
National Vulnerability Database (NVD) Shifts to Selective Enrichment as CVE Volume Surges
1+ day, 18+ hour ago (613+ words) Home " Cybersecurity " Threats & Breaches " Vulnerabilities " National Vulnerability Database (NVD) Shifts to Selective Enrichment as CVE Volume Surges In this post, we examine what NVD's shift to selective enrichment means for vulnerability workflows and how security teams can maintain visibility and…...
NIST, Overrun by Massive Numbers of Submitted CVEs, Limits Analysis Work
1+ day, 18+ hour ago (438+ words) Home " Cybersecurity " Threats & Breaches " Vulnerabilities " NIST, Overrun by Massive Numbers of Submitted CVEs, Limits Analysis Work The federal agency that for years has tracked, analyzed, and cataloged software vulnerabilities and made the information widely available is being overwhelmed by the…...
Lattice-based Cryptographic Integration for MCP Host-Client Communication
3+ day, 11+ hour ago (1011+ words) The post Lattice-based Cryptographic Integration for MCP Host-Client Communication appeared first on Read the Gopher Security's Quantum Safety Blog. Ever wonder why some ai systems feel rock solid while others glitch out the second they lose a signal? It usually…...
[un]prompted 2026 - Tenderizing The Target
3+ day, 17+ hour ago (142+ words) Author, Creator & Presenter: Aaron Grattafiori, Principle Offensive Al Security Researcher At NVIDIA & Skyler Bingham, Principal Applied Researcher At NVIDIA Our thanks to prompted for publishing their Creators, Authors and Presenter's outstanding prompted 2026 AI Security Practitioner content on the Organizations' You…...
The Anthropic Mythos, Project'Glasswing, and the Illusion of Patch-Based Security
3+ day, 20+ hour ago (592+ words) Home " Security Bloggers Network " The Anthropic Mythos, Project'Glasswing, and the Illusion of Patch-Based Security Project Glasswing is a reminder of something many in the federal cybersecurity community already know but don't always say out loud: We are never going to…...
Inside a Stealth, Multipath, Zero Trust Transport Layer for AI
3+ day, 17+ hour ago (736+ words) Home " Security Bloggers Network " Inside a Stealth, Multipath, Zero Trust Transport Layer for AI The post Inside a Stealth, Multipath, Zero Trust Transport Layer for AI appeared first on Dispersive Blog. Series Note: This article is Part Four of our…...