Send us a text We unpack how AI shifts the security game, from state-backed use of agentic tools to prompt injections that hijack functions and bypass access. We also show how to control Gemini’s training access to your data and outline practical steps to harden AI stacks. • Anthropic’s disclosure of state actor abuse of agentic AI • MITRE ATT&CK at machine speed via spawned agents • When hallucinations blunt attacks and when they don’t • Prompt injection and second-order function hijack...
All content for Silent Mode Cafe is the property of Silent Mode Cafe and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text We unpack how AI shifts the security game, from state-backed use of agentic tools to prompt injections that hijack functions and bypass access. We also show how to control Gemini’s training access to your data and outline practical steps to harden AI stacks. • Anthropic’s disclosure of state actor abuse of agentic AI • MITRE ATT&CK at machine speed via spawned agents • When hallucinations blunt attacks and when they don’t • Prompt injection and second-order function hijack...
Weekly Security Roundup - Data Breaches Targeting Your Digital Live
Silent Mode Cafe
21 minutes
7 months ago
Weekly Security Roundup - Data Breaches Targeting Your Digital Live
Send us a text summary In this episode of Silent Mode Cafe, hosts Salah Nassar and Vivek Chugh discuss the latest developments in the security and privacy landscape. They cover significant data breaches, the implications of tech companies' practices, and emerging threats in cybersecurity. The conversation emphasizes the importance of awareness and proactive measures to protect personal data in an increasingly interconnected world. takeaways The security and privacy world is constantly evo...
Silent Mode Cafe
Send us a text We unpack how AI shifts the security game, from state-backed use of agentic tools to prompt injections that hijack functions and bypass access. We also show how to control Gemini’s training access to your data and outline practical steps to harden AI stacks. • Anthropic’s disclosure of state actor abuse of agentic AI • MITRE ATT&CK at machine speed via spawned agents • When hallucinations blunt attacks and when they don’t • Prompt injection and second-order function hijack...