<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Eresus Security Research Feed</title>
    <link>https://www.eresussec.com</link>
    <atom:link href="https://www.eresussec.com/rss.xml" rel="self" type="application/rss+xml" />
    <description>Research, advisories, and offensive security writing from Eresus Security.</description>
    <language>en-us</language>
    <lastBuildDate>Fri, 17 Apr 2026 20:05:32 GMT</lastBuildDate>
    
    <item>
      <title><![CDATA[Building a Zero Trust Architecture for Enterprise AI and LLM Deployment]]></title>
      <link>https://www.eresussec.com/blog/zero-trust-architecture-for-ai-models_en</link>
      <guid>https://www.eresussec.com/blog/zero-trust-architecture-for-ai-models_en</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Why integrating an LLM requires strict micro-segmentation. Learn how to construct a Zero Trust framework to prevent GenAI from becoming an internal...]]></description>
    </item>
    <item>
      <title><![CDATA[Yapay Zeka Ağları İçin Zero Trust (Sıfır Güven) Mimarisi Nasıl İnşa Edilir?]]></title>
      <link>https://www.eresussec.com/blog/zero-trust-architecture-for-ai-models</link>
      <guid>https://www.eresussec.com/blog/zero-trust-architecture-for-ai-models</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[LLM ve RAG sistemlerini kurumsal ağınıza dahil ederken mikro segmentasyon ve Zero Trust mimarisinin neden zorunlu bir kalkan olduğunu öğrenin.]]></description>
    </item>
    <item>
      <title><![CDATA[What is AI Security? A Complete Enterprise Blueprint for Securing Machine Learning Ecosystems]]></title>
      <link>https://www.eresussec.com/blog/what-is-ai-security_en</link>
      <guid>https://www.eresussec.com/blog/what-is-ai-security_en</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[A deep dive into the complex world of AI Security. Understand the mechanics behind data poisoning, adversarial ML evasion, and prompt injection attacks...]]></description>
    </item>
    <item>
      <title><![CDATA[Yapay Zeka Güvenliği (AI Security) Nedir ve Kurumlar İçin Neden Kritik Bir Öneme Sahiptir?]]></title>
      <link>https://www.eresussec.com/blog/what-is-ai-security</link>
      <guid>https://www.eresussec.com/blog/what-is-ai-security</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Yapay Zeka Güvenliği (AI Security) ve Makine Öğrenimi zafiyetlerinin anatomisi. Veri zehirlenmesi, Adversarial saldırılar ve Prompt Injection...]]></description>
    </item>
    <item>
      <title><![CDATA[OWASP Top 10 for LLMs: The Definitive Guide to AI Vulnerabilities]]></title>
      <link>https://www.eresussec.com/blog/owasp-top-10-for-llm-vulnerabilities_en</link>
      <guid>https://www.eresussec.com/blog/owasp-top-10-for-llm-vulnerabilities_en</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Explore the official OWASP Top 10 for Large Language Models (LLMs). From Prompt Injection to Supply Chain Attacks, learn how to secure your enterprise...]]></description>
    </item>
    <item>
      <title><![CDATA[OWASP Top 10 for LLM: Yapay Zeka Uygulamalarındaki En Kritik 10 Zafiyet]]></title>
      <link>https://www.eresussec.com/blog/owasp-top-10-for-llm-vulnerabilities</link>
      <guid>https://www.eresussec.com/blog/owasp-top-10-for-llm-vulnerabilities</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Büyük Dil Modelleri (LLM) için hazırlanan OWASP Top 10 listesini yakından inceleyin. Prompt enjeksiyonundan zehirli veriye kadar en kritik yapay zeka...]]></description>
    </item>
    <item>
      <title><![CDATA[The Art of LLM Jailbreaking: Demystifying Offensive Prompt Engineering]]></title>
      <link>https://www.eresussec.com/blog/llm-jailbreaking-red-teaming-tactics_en</link>
      <guid>https://www.eresussec.com/blog/llm-jailbreaking-red-teaming-tactics_en</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[How do Red Teamers bypass the safety filters of Large Language Models? Dive deep into the manipulative art of LLM Jailbreaking, DAN prompts, and...]]></description>
    </item>
    <item>
      <title><![CDATA[Yapay Zeka Jailbreak (LLM Sınır Aşımı) Sanatı: Kodlar Nasıl Kırılır?]]></title>
      <link>https://www.eresussec.com/blog/llm-jailbreaking-red-teaming-tactics</link>
      <guid>https://www.eresussec.com/blog/llm-jailbreaking-red-teaming-tactics</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Siber güvenlik uzmanları ve Red Team ekipleri Büyük Dil Modellerini (LLM) nasıl Jailbreak eder? GenAI sınırlarını aşmanın (DAN, Do Anything Now) teknik...]]></description>
    </item>
    <item>
      <title><![CDATA[AI Compliance Crisis: Navigating GDPR/KVKK in RAG Architectures]]></title>
      <link>https://www.eresussec.com/blog/gdpr-kvkk-compliance-for-rag-ai-models_en</link>
      <guid>https://www.eresussec.com/blog/gdpr-kvkk-compliance-for-rag-ai-models_en</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Discover the severe data privacy risks of Enterprise RAG models. Learn how to align Large Language Models with GDPR mandates like the 'Right to be...]]></description>
    </item>
    <item>
      <title><![CDATA[KVKK ve GDPR Kapsamında RAG Modelleri: Yapay Zekada Veri Mahremiyeti Çıkmazı]]></title>
      <link>https://www.eresussec.com/blog/gdpr-kvkk-compliance-for-rag-ai-models</link>
      <guid>https://www.eresussec.com/blog/gdpr-kvkk-compliance-for-rag-ai-models</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Şirket içi RAG (Retrieval-Augmented Generation) mimarilerinde KVKK ve GDPR uyumluluğu nasıl sağlanır? LLM tabanlı sistemlerde 'Unutulma Hakkı' ve veri...]]></description>
    </item>
    <item>
      <title><![CDATA[The Rise of Corporate Deepfakes and Vishing: AI-Powered Social Engineering]]></title>
      <link>https://www.eresussec.com/blog/deepfake-vishing-ai-social-engineering_en</link>
      <guid>https://www.eresussec.com/blog/deepfake-vishing-ai-social-engineering_en</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Discover how threat actors use Deepfakes and Voice Phishing (Vishing) for multi-million dollar corporate heists, and how to defend your enterprise.]]></description>
    </item>
    <item>
      <title><![CDATA[Derin Sahtecilik (Deepfake) Suçları ve Vishing: AI Destekli Yeni Nesil Oltalama]]></title>
      <link>https://www.eresussec.com/blog/deepfake-vishing-ai-social-engineering</link>
      <guid>https://www.eresussec.com/blog/deepfake-vishing-ai-social-engineering</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Yapay zeka ses klonlama (Vishing) ve Deepfake teknolojilerinin kurumsal dolandırıcılıklarda nasıl kullanıldığını ve bunlara karşı savunma stratejilerini...]]></description>
    </item>
    <item>
      <title><![CDATA[The Rise of the Certified AI Security Professional (CAISP): Reimagining Enterprise Pentesting]]></title>
      <link>https://www.eresussec.com/blog/certified-ai-security-professional_en</link>
      <guid>https://www.eresussec.com/blog/certified-ai-security-professional_en</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Traditional penetration testing cannot protect Machine Learning models. Learn why the Certified AI Security Professional (CAISP) is crucial for securing...]]></description>
    </item>
    <item>
      <title><![CDATA[AI Security Uzmanlığı: CAISP Sertifikasyonu ve Yapay Zeka Pentesting Zorunluluğu]]></title>
      <link>https://www.eresussec.com/blog/certified-ai-security-professional</link>
      <guid>https://www.eresussec.com/blog/certified-ai-security-professional</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Geleneksel Sızma Testleri yapay zekayı koruyamaz! Certified AI Security Professional (CAISP) sertifikasyonu ve Red Teaming'in endüstri için neden kritik...]]></description>
    </item>
    <item>
      <title><![CDATA[Bug Bounties for AI Systems: Harnessing Crowdsourced Security for LLMs]]></title>
      <link>https://www.eresussec.com/blog/bug-bounty-for-ai-systems_en</link>
      <guid>https://www.eresussec.com/blog/bug-bounty-for-ai-systems_en</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Discover why traditional Bug Bounty programs fail for Generative AI, and how enterprises can launch crowdsourced vulnerability disclosure programs to...]]></description>
    </item>
    <item>
      <title><![CDATA[AI Güvenliği İçin Bug Bounty: Siber Korsanları Kendi Silahınız Yapın]]></title>
      <link>https://www.eresussec.com/blog/bug-bounty-for-ai-systems</link>
      <guid>https://www.eresussec.com/blog/bug-bounty-for-ai-systems</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Kurumsal Yapay Zeka uygulamalarınızın sınırlarını test etmek için kalabalığın gücünü (Bug Bounty) kullanın. AI zafiyet programları neden standart...]]></description>
    </item>
    <item>
      <title><![CDATA[AI Supply Chain Attacks: The Hidden Trojans Inside Open-Source LLMs]]></title>
      <link>https://www.eresussec.com/blog/ai-supply-chain-attacks-huggingface_en</link>
      <guid>https://www.eresussec.com/blog/ai-supply-chain-attacks-huggingface_en</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Discover the severe threat of AI Supply Chain attacks via platforms like Hugging Face. How attackers leverage Pickle payloads and backdoored...]]></description>
    </item>
    <item>
      <title><![CDATA[Yapay Zeka Tedarik Zinciri Saldırıları: Hugging Face İçindeki Zehirli Modeller]]></title>
      <link>https://www.eresussec.com/blog/ai-supply-chain-attacks-huggingface</link>
      <guid>https://www.eresussec.com/blog/ai-supply-chain-attacks-huggingface</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Açık kaynaklı yapay zeka modellerindeki Truva Atları! Hugging Face ve GitHub üzerinden şirket ağınıza sızan zehirli Pickle ve GGUF modellerinin...]]></description>
    </item>
    <item>
      <title><![CDATA[AI Safety vs. AI Security: Understanding the Fundamental Differences in Enterprise ML]]></title>
      <link>https://www.eresussec.com/blog/ai-safety-vs-ai-security_en</link>
      <guid>https://www.eresussec.com/blog/ai-safety-vs-ai-security_en</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Discover the critical distinctions between AI Safety (protecting humans from AI) and AI Security (protecting AI from malicious threat actors and hackers).]]></description>
    </item>
    <item>
      <title><![CDATA[AI Safety ve AI Security Arasındaki Temel Farklar: Emniyet Mi, Yoksa Siber Güvenlik Mi?]]></title>
      <link>https://www.eresussec.com/blog/ai-safety-vs-ai-security</link>
      <guid>https://www.eresussec.com/blog/ai-safety-vs-ai-security</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[AI Safety (Yapay Zeka Emniyeti) ile AI Security (Yapay Zeka Siber Güvenliği) arasındaki kritik ayrımları öğrenin. Kurumsal LLM sistemlerini inşa ederken...]]></description>
    </item>
  </channel>
</rss>