<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Eresus Security Research Feed</title>
    <link>https://www.eresussec.com</link>
    <atom:link href="https://www.eresussec.com/rss.xml" rel="self" type="application/rss+xml" />
    <description>Research, advisories, and offensive security writing from Eresus Security.</description>
    <language>en-us</language>
    <lastBuildDate>Fri, 03 Apr 2026 18:32:03 GMT</lastBuildDate>
    
    <item>
      <title><![CDATA[What is a Vector Database? Its Role in AI and LLM Security]]></title>
      <link>https://www.eresussec.com/blog/what-is-vector-database-ai-security_en</link>
      <guid>https://www.eresussec.com/blog/what-is-vector-database-ai-security_en</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[How do Vector Databases, the heart of modern AI (LLM) projects, actually work? Discover everything you need to know to prevent data leakage and poisoning in RAG (Retrieval-Augmented Generation) architectures.]]></description>
    </item>
    <item>
      <title><![CDATA[Vektör Veritabanları (Vector Database) Nedir? AI ve LLM Güvenliğindeki Yeri]]></title>
      <link>https://www.eresussec.com/blog/what-is-vector-database-ai-security</link>
      <guid>https://www.eresussec.com/blog/what-is-vector-database-ai-security</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Yapay zeka (LLM) projelerinin kalbi olan Vektör Veritabanları nasıl çalışır? RAG (Retrieval-Augmented Generation) mimarilerinde veri sızıntılarını önlemek için bilmeniz gereken her şey.]]></description>
    </item>
    <item>
      <title><![CDATA[Structuring and Securing AI Microservices in Python (FastAPI)]]></title>
      <link>https://www.eresussec.com/blog/structuring-fastapi-ai-microservices_en</link>
      <guid>https://www.eresussec.com/blog/structuring-fastapi-ai-microservices_en</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Why must you transition from monolithic setups to a microservices architecture when exposing AI models to the public? Designing attack-resistant Python AI services using FastAPI and gRPC.]]></description>
    </item>
    <item>
      <title><![CDATA[Python ile AI Mikroservis Mimarisini Kurmak ve Güvenliğini Sağlamak (FastAPI)]]></title>
      <link>https://www.eresussec.com/blog/structuring-fastapi-ai-microservices</link>
      <guid>https://www.eresussec.com/blog/structuring-fastapi-ai-microservices</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Makine öğrenimi modellerinizi (AI) dış dünyaya açarken neden monolitik yapılardan mikroservis mimarisine geçmelisiniz? FastAPI ve gRPC ile siber saldırılara dirençli Python AI servisleri tasarımı.]]></description>
    </item>
    <item>
      <title><![CDATA[Why Should We Use Rust for AI-Powered Backend Systems?]]></title>
      <link>https://www.eresussec.com/blog/rust-language-ai-backend-security_en</link>
      <guid>https://www.eresussec.com/blog/rust-language-ai-backend-security_en</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[When AI assistants are writing half your code, how do you ensure system security? Discover the superiority of the Rust language and its Memory Safety guarantees in modern AI backend architectures.]]></description>
    </item>
    <item>
      <title><![CDATA[Yapay Zeka Destekli Backend Sistemlerinde Neden Rust Kullanmalıyız?]]></title>
      <link>https://www.eresussec.com/blog/rust-language-ai-backend-security</link>
      <guid>https://www.eresussec.com/blog/rust-language-ai-backend-security</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Yapay zeka asistanları kodunuzun yarısını yazarken sistemin güvenliğini nasıl sağlarsınız? Hafıza güvenliği (Memory Safety) garantisi veren Rust dilinin yapay zeka backend mimarilerindeki üstünlüğü.]]></description>
    </item>
    <item>
      <title><![CDATA[Cloud Security: AWS IAM Flaws and One-Click Privilege Escalation]]></title>
      <link>https://www.eresussec.com/blog/aws-iam-misconfigurations-privilege-escalation_en</link>
      <guid>https://www.eresussec.com/blog/aws-iam-misconfigurations-privilege-escalation_en</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Why do 80% of organizations using Cloud Computing (AWS, Azure) suffer massive breaches strictly through misconfigured Identity and Access Management (IAM)? A deep dive into SSRF and Metadata theft.]]></description>
    </item>
    <item>
      <title><![CDATA[Bulut Güvenliği: AWS IAM Hataları ve Tek Tıkla Privilege Escalation (Yetki Yükseltme)]]></title>
      <link>https://www.eresussec.com/blog/aws-iam-misconfigurations-privilege-escalation</link>
      <guid>https://www.eresussec.com/blog/aws-iam-misconfigurations-privilege-escalation</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Bulut Bilişimdeki (AWS, Azure) şirketlerin %80'i en büyük saldırıyı yanlış yapılandırılmış kimlik yönetiminden (IAM) yiyor. SSRF kullanılarak Metadata'dan çalınan rolün nasıl Admin'e evrildiğini inceleyelim.]]></description>
    </item>
    <item>
      <title><![CDATA[Authentication in AI Applications: LLM Sessions and Data Privacy]]></title>
      <link>https://www.eresussec.com/blog/ai-apps-authentication-session-management_en</link>
      <guid>https://www.eresussec.com/blog/ai-apps-authentication-session-management_en</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Vulnerable JWT management and Context Hijacking attacks in Chatbots, RAG architectures, and AI assistants. Learn how to architect robust Authentication for AI applications.]]></description>
    </item>
    <item>
      <title><![CDATA[Yapay Zeka Uygulamalarında Kimlik Doğrulama: LLM Oturumları (Session) ve Veri Gizliliği]]></title>
      <link>https://www.eresussec.com/blog/ai-apps-authentication-session-management</link>
      <guid>https://www.eresussec.com/blog/ai-apps-authentication-session-management</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Chatbotlar, RAG mimarileri ve AI asistanlarında zafiyetli JWT yönetimi ve Kullanıcı Bağlamı (Context Hijacking) saldırıları. AI uygulamalarında Auth süreçlerini nasıl kurmalısınız?]]></description>
    </item>
    <item>
      <title><![CDATA[Python'un En Saf Bug'ı: Makine Öğrenimi Modellerinde (.pkl) Uzaktan Kod Çalıştırma (RCE) Zafiyeti]]></title>
      <link>https://www.eresussec.com/blog/pickle-rce-zafiyeti-makine-ogrenimi</link>
      <guid>https://www.eresussec.com/blog/pickle-rce-zafiyeti-makine-ogrenimi</guid>
      <pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Göz önünde saklanan zafiyetler her zaman en tehlikeli olanlarıdır. Özellikle Makine Öğrenimi (ML) dünyasında veri bilimciler her gün yüzlerce model...]]></description>
    </item>
    <item>
      <title><![CDATA[The Simplest Bug is the Deadliest: Remote Code Execution (RCE) via Pickle in Machine Learning]]></title>
      <link>https://www.eresussec.com/blog/pickle-rce-vulnerability-machine-learning</link>
      <guid>https://www.eresussec.com/blog/pickle-rce-vulnerability-machine-learning</guid>
      <pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Sometimes the simplest bugs are the most dangerous—especially when they’ve been hiding in plain sight. In the world of Machine Learning (ML), data ...]]></description>
    </item>
    <item>
      <title><![CDATA[New Perseus Android Banking Malware Monitors Notes Apps for Sensitive Data]]></title>
      <link>https://www.eresussec.com/blog/perseus-android-banking-malware-accessibility</link>
      <guid>https://www.eresussec.com/blog/perseus-android-banking-malware-accessibility</guid>
      <pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[A novel Android banking malware dubbed 'Perseus' exploits accessibility services via phishing apps to monitor device screens, harvest sensitive data from notes apps, and execute financial fraud.]]></description>
    </item>
    <item>
      <title><![CDATA[Android 'Perseus' Bankacılık Malware'i Not Uygulamalarına Sızıyor]]></title>
      <link>https://www.eresussec.com/blog/perseus-android-bankacilik-zararlisi-erisebilirlik</link>
      <guid>https://www.eresussec.com/blog/perseus-android-bankacilik-zararlisi-erisebilirlik</guid>
      <pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Yeni keşfedilen Perseus Android bankacılık zararlısı (malware), kimlik avı uygulamalarıyla 'Erişilebilirlik' (Accessibility) servislerini istismar ederek cihazı ele geçiriyor.]]></description>
    </item>
    <item>
      <title><![CDATA[Otomatik Zafiyet Taraması vs. Manuel Sızma Testi: Hangisi Gereklidir?]]></title>
      <link>https://www.eresussec.com/blog/otomatik-vs-manuel-pentest</link>
      <guid>https://www.eresussec.com/blog/otomatik-vs-manuel-pentest</guid>
      <pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Şirketiniz için siber güvenlik yatırımına karar verirken IT ekiplerinin veya yönetim kurullarının masasında genelde şu tartışma başlar: "Binlerce...]]></description>
    </item>
    <item>
      <title><![CDATA[Göz Ardı Edilen Tehdit Yüzeyi: Yapay Zeka (AI) Model Dosyalarında Gizlenen Sıfırıncı Gün (0-Day) Zafiyetleri]]></title>
      <link>https://www.eresussec.com/blog/mfv-yapay-zeka-model-dosyasi-0day-zafiyetleri</link>
      <guid>https://www.eresussec.com/blog/mfv-yapay-zeka-model-dosyasi-0day-zafiyetleri</guid>
      <pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Siber güvenlik dünyasında herkes API güvenliğine, web zafiyetlerine veya bulut sızıntılarına odaklanmışken devasa bir tehdit yüzeyi göz ardı ediliy...]]></description>
    </item>
    <item>
      <title><![CDATA[The Overlooked Attack Surface: Hunting 0-Days in AI Model Files]]></title>
      <link>https://www.eresussec.com/blog/mfv-ai-model-file-0day-vulnerabilities</link>
      <guid>https://www.eresussec.com/blog/mfv-ai-model-file-0day-vulnerabilities</guid>
      <pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[When discussing cybersecurity in Artificial Intelligence, everyone fixates on API security, prompt injections, and web vulnerabilities. Meanwhile, ...]]></description>
    </item>
    <item>
      <title><![CDATA[Artificial Intelligence (LLM) Manipulations: Prompt Injection and RAG Poisoning]]></title>
      <link>https://www.eresussec.com/blog/llm-prompt-injection-rag-poisoning-ai-security_en</link>
      <guid>https://www.eresussec.com/blog/llm-prompt-injection-rag-poisoning-ai-security_en</guid>
      <pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[How does the shiny new ChatGPT clone your company launched fall straight into the hands of cyber attackers? An anatomical breakdown of Direct and Indirect Prompt Injection, and Data Poisoning attacks.]]></description>
    </item>
    <item>
      <title><![CDATA[Yapay Zeka (LLM) Manipülasyonları: Prompt Injection ve RAG Zehirlenmesi]]></title>
      <link>https://www.eresussec.com/blog/llm-prompt-injection-rag-poisoning-ai-security</link>
      <guid>https://www.eresussec.com/blog/llm-prompt-injection-rag-poisoning-ai-security</guid>
      <pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Şirketinizin gururla yayınladığı ChatGPT klonu siber korsanların emrine nasıl geçiyor? Doğrudan (Direct) ve Dolaylı (Indirect) Prompt Injection, Data Poisoning saldırılarının anatomisi.]]></description>
    </item>
    <item>
      <title><![CDATA[Critical Vulnerabilities in AI Frameworks (GGUF & MXNet): The Heap Overflow Threat]]></title>
      <link>https://www.eresussec.com/blog/gguf-mxnet-ai-model-memory-vulnerabilities_en</link>
      <guid>https://www.eresussec.com/blog/gguf-mxnet-ai-model-memory-vulnerabilities_en</guid>
      <pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Model compression standards like GGUF make running LLMs easy, but are they secure? Discover how malicious model files induce memory and heap overflows to completely compromise host systems.]]></description>
    </item>
  </channel>
</rss>