Send us a text We unpack how AI shifts the security game, from state-backed use of agentic tools to prompt injections that hijack functions and bypass access. We also show how to control Gemini’s training access to your data and outline practical steps to harden AI stacks. • Anthropic’s disclosure of state actor abuse of agentic AI • MITRE ATT&CK at machine speed via spawned agents • When hallucinations blunt attacks and when they don’t • Prompt injection and second-order function hijack...
All content for Silent Mode Cafe is the property of Silent Mode Cafe and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text We unpack how AI shifts the security game, from state-backed use of agentic tools to prompt injections that hijack functions and bypass access. We also show how to control Gemini’s training access to your data and outline practical steps to harden AI stacks. • Anthropic’s disclosure of state actor abuse of agentic AI • MITRE ATT&CK at machine speed via spawned agents • When hallucinations blunt attacks and when they don’t • Prompt injection and second-order function hijack...
Weekly Roundup: Your data is being harvested right now, and here's what to do about it.
Silent Mode Cafe
17 minutes
3 months ago
Weekly Roundup: Your data is being harvested right now, and here's what to do about it.
Send us a text Salah and Vivek tackle major ransomware attacks on aviation infrastructure, critical Android security updates, and new California privacy regulations affecting how companies use AI to make decisions about you. They provide practical security advice for protecting yourself in an increasingly complex digital landscape. • Collins Airspace hit with ransomware causing flight delays and baggage issues across European airports • Android pushes critical September update fixing 84 vuln...
Silent Mode Cafe
Send us a text We unpack how AI shifts the security game, from state-backed use of agentic tools to prompt injections that hijack functions and bypass access. We also show how to control Gemini’s training access to your data and outline practical steps to harden AI stacks. • Anthropic’s disclosure of state actor abuse of agentic AI • MITRE ATT&CK at machine speed via spawned agents • When hallucinations blunt attacks and when they don’t • Prompt injection and second-order function hijack...