EresusSecurity
Research & Intelligence

Eresus research, advisory, and security news

We collect writing, advisories, and current-event analysis around AI security, the MCP ecosystem, application security, and real attack chaining here.

Advisory Analysis · 3Guide · 1News · 3Research · 100

Latest Posts

Threat Intelligence

The Rise of Corporate Deepfakes and Vishing: AI-Powered Social Engineering

Discover how threat actors use Deepfakes and Voice Phishing (Vishing) for multi-million dollar corporate heists, and how to defend your enterprise.

2026-04-14Read
Red Teaming

The Rise of the Certified AI Security Professional (CAISP): Reimagining Enterprise Pentesting

Traditional penetration testing cannot protect Machine Learning models. Learn why the Certified AI Security Professional (CAISP) is crucial for securing...

2026-04-14Read
Offensive Security

Bug Bounties for AI Systems: Harnessing Crowdsourced Security for LLMs

Discover why traditional Bug Bounty programs fail for Generative AI, and how enterprises can launch crowdsourced vulnerability disclosure programs to...

2026-04-14Read
Offensive Security

AI Supply Chain Attacks: The Hidden Trojans Inside Open-Source LLMs

Discover the severe threat of AI Supply Chain attacks via platforms like Hugging Face. How attackers leverage Pickle payloads and backdoored...

2026-04-27Read
GenAI

AI Safety vs. AI Security

Discover the critical distinctions between AI Safety (protecting humans from AI) and AI Security (protecting AI from malicious threat actors and hackers).

2026-04-27Read
Threat Intelligence

AI-Orchestrated Cyber Espionage: The Dawn of Autonomous APT Campaigns

Discover how Advanced Persistent Threats (APTs) weaponize Generative AI and autonomous agents to conduct hyper-scalable, undetectable cyber espionage...

2026-04-27Read
AI Security

What Is AI Data Governance and Why Is It So Hard to Implement?

AI data governance is the missing link in Enterprise AI Security. Learn why traditional Data Loss Prevention (DLP) fails when applied to LLMs and how to...

2026-04-27Read
Agentic AI

How AI Coding Assistants Expose Secrets

Discover the critical AI Security risks associated with autonomous coding tools. Learn how Cursor, Copilot, and Claude can inadvertently leak your .env...

2026-04-27Read
Backdoor Threats

TensorFlow Custom Operator Injection (Graph Execution)

Identifies backdoor threats leveraging embedded malformed computational nodes (Custom Operators) within TensorFlow models to silently trigger execution...

2026-04-10Read