Send us a text We unpack how AI shifts the security game, from state-backed use of agentic tools to prompt injections that hijack functions and bypass access. We also show how to control Gemini’s training access to your data and outline practical steps to harden AI stacks. • Anthropic’s disclosure of state actor abuse of agentic AI • MITRE ATT&CK at machine speed via spawned agents • When hallucinations blunt attacks and when they don’t • Prompt injection and second-order function hijack...
All content for Silent Mode Cafe is the property of Silent Mode Cafe and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text We unpack how AI shifts the security game, from state-backed use of agentic tools to prompt injections that hijack functions and bypass access. We also show how to control Gemini’s training access to your data and outline practical steps to harden AI stacks. • Anthropic’s disclosure of state actor abuse of agentic AI • MITRE ATT&CK at machine speed via spawned agents • When hallucinations blunt attacks and when they don’t • Prompt injection and second-order function hijack...
Weekly Roundup - Security Nightmares That'll Make Your Phone Cry
Silent Mode Cafe
17 minutes
4 months ago
Weekly Roundup - Security Nightmares That'll Make Your Phone Cry
Send us a text Digital security has reached a critical point with multiple major breaches threatening user data worldwide. We break down the most pressing threats and provide practical steps to protect yourself without needing technical expertise. • Google Salesforce breach exposing customer data, leading to sophisticated phishing attempts • Apple and WhatsApp pushing critical updates to patch vulnerabilities where even photos can hack your phone • 77 Android apps caught stealing banking det...
Silent Mode Cafe
Send us a text We unpack how AI shifts the security game, from state-backed use of agentic tools to prompt injections that hijack functions and bypass access. We also show how to control Gemini’s training access to your data and outline practical steps to harden AI stacks. • Anthropic’s disclosure of state actor abuse of agentic AI • MITRE ATT&CK at machine speed via spawned agents • When hallucinations blunt attacks and when they don’t • Prompt injection and second-order function hijack...