Eresus research, advisory, and security news
We collect writing, advisories, and current-event analysis around AI security, the MCP ecosystem, application security, and real attack chaining here.
Latest Posts
The Rise of Corporate Deepfakes and Vishing: AI-Powered Social Engineering
Discover how threat actors use Deepfakes and Voice Phishing (Vishing) for multi-million dollar corporate heists, and how to defend your enterprise.
The Rise of the Certified AI Security Professional (CAISP): Reimagining Enterprise Pentesting
Traditional penetration testing cannot protect Machine Learning models. Learn why the Certified AI Security Professional (CAISP) is crucial for securing...
Bug Bounties for AI Systems: Harnessing Crowdsourced Security for LLMs
Discover why traditional Bug Bounty programs fail for Generative AI, and how enterprises can launch crowdsourced vulnerability disclosure programs to...
AI Supply Chain Attacks: The Hidden Trojans Inside Open-Source LLMs
Discover the severe threat of AI Supply Chain attacks via platforms like Hugging Face. How attackers leverage Pickle payloads and backdoored...
AI Safety vs. AI Security
Discover the critical distinctions between AI Safety (protecting humans from AI) and AI Security (protecting AI from malicious threat actors and hackers).
AI-Orchestrated Cyber Espionage: The Dawn of Autonomous APT Campaigns
Discover how Advanced Persistent Threats (APTs) weaponize Generative AI and autonomous agents to conduct hyper-scalable, undetectable cyber espionage...
What Is AI Data Governance and Why Is It So Hard to Implement?
AI data governance is the missing link in Enterprise AI Security. Learn why traditional Data Loss Prevention (DLP) fails when applied to LLMs and how to...
How AI Coding Assistants Expose Secrets
Discover the critical AI Security risks associated with autonomous coding tools. Learn how Cursor, Copilot, and Claude can inadvertently leak your .env...
TensorFlow Custom Operator Injection (Graph Execution)
Identifies backdoor threats leveraging embedded malformed computational nodes (Custom Operators) within TensorFlow models to silently trigger execution...