Send us a text We unpack how AI shifts the security game, from state-backed use of agentic tools to prompt injections that hijack functions and bypass access. We also show how to control Gemini’s training access to your data and outline practical steps to harden AI stacks. • Anthropic’s disclosure of state actor abuse of agentic AI • MITRE ATT&CK at machine speed via spawned agents • When hallucinations blunt attacks and when they don’t • Prompt injection and second-order function hijack...
All content for Silent Mode Cafe is the property of Silent Mode Cafe and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text We unpack how AI shifts the security game, from state-backed use of agentic tools to prompt injections that hijack functions and bypass access. We also show how to control Gemini’s training access to your data and outline practical steps to harden AI stacks. • Anthropic’s disclosure of state actor abuse of agentic AI • MITRE ATT&CK at machine speed via spawned agents • When hallucinations blunt attacks and when they don’t • Prompt injection and second-order function hijack...
Weekly Security Roundup: Your Digital Footprint Is Never Truly Private
Silent Mode Cafe
31 minutes
5 months ago
Weekly Security Roundup: Your Digital Footprint Is Never Truly Private
Send us a text The digital world grows increasingly dangerous by the week, and our latest episode dives deep into the cybersecurity threats that affect both global powers and everyday users alike. We break down the alarming "SharePoint-ageddon" vulnerability that has compromised over 400 organizations—including critical US government agencies like the Department of Energy and Nuclear Security Administration. This sophisticated attack, allegedly orchestrated by China-linked hacking groups, dem...
Silent Mode Cafe
Send us a text We unpack how AI shifts the security game, from state-backed use of agentic tools to prompt injections that hijack functions and bypass access. We also show how to control Gemini’s training access to your data and outline practical steps to harden AI stacks. • Anthropic’s disclosure of state actor abuse of agentic AI • MITRE ATT&CK at machine speed via spawned agents • When hallucinations blunt attacks and when they don’t • Prompt injection and second-order function hijack...