<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Eresus Security Research Feed</title>
    <link>https://www.eresussec.com</link>
    <atom:link href="https://www.eresussec.com/rss.xml" rel="self" type="application/rss+xml" />
    <description>Research, advisories, and offensive security writing from Eresus Security.</description>
    <language>en-us</language>
    <lastBuildDate>Sat, 25 Apr 2026 12:26:22 GMT</lastBuildDate>
    
    <item>
      <title><![CDATA[What is AWS IAM and Why is it the First Line of Defense in Cloud Security?]]></title>
      <link>https://www.eresussec.com/en/blog/aws-iam-first-line-of-defense-cloud-security</link>
      <guid>https://www.eresussec.com/en/blog/aws-iam-first-line-of-defense-cloud-security</guid>
      <pubDate>Fri, 24 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Learn how AWS Identity and Access Management (IAM) controls access, prevents data breaches, and serves as the ultimate perimeter in modern cloud security.]]></description>
    </item>
    <item>
      <title><![CDATA[What the Vercel and Context.ai Incident Changes for AI-Connected SaaS Security]]></title>
      <link>https://www.eresussec.com/en/blog/vercel-context-ai-security-incident-analysis</link>
      <guid>https://www.eresussec.com/en/blog/vercel-context-ai-security-incident-analysis</guid>
      <pubDate>Wed, 22 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Eresus analyzes the April 20, 2026 Vercel incident linked to Context.ai and explains why OAuth-connected AI tools now belong in the core SaaS attack surface.]]></description>
    </item>
    <item>
      <title><![CDATA[The MCP RCE Wave of April 16–22, 2026: Why Architecture Now Matters More Than a Single CVE]]></title>
      <link>https://www.eresussec.com/en/blog/mcp-rce-architecture-wave-april-2026</link>
      <guid>https://www.eresussec.com/en/blog/mcp-rce-architecture-wave-april-2026</guid>
      <pubDate>Wed, 22 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Eresus reviews the April 16–22, 2026 wave of MCP-related command execution issues and explains why the real story is architectural inheritance across SDKs, brokers, and server registration flows.]]></description>
    </item>
    <item>
      <title><![CDATA[AI Agent Traps and the Web: What Google DeepMind’s April 6, 2026 Research Means in Practice]]></title>
      <link>https://www.eresussec.com/en/blog/ai-agent-traps-web-attacks-analysis</link>
      <guid>https://www.eresussec.com/en/blog/ai-agent-traps-web-attacks-analysis</guid>
      <pubDate>Wed, 22 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Eresus breaks down Google DeepMind research on web-based attacks against AI agents and explains why hidden content, poisoned memory, and behavioral steering now belong in real-world threat models.]]></description>
    </item>
    <item>
      <title><![CDATA[Building a Zero Trust Architecture for Enterprise AI and LLM Deployment]]></title>
      <link>https://www.eresussec.com/en/blog/zero-trust-architecture-for-ai-models</link>
      <guid>https://www.eresussec.com/en/blog/zero-trust-architecture-for-ai-models</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Why integrating an LLM requires strict micro-segmentation. Learn how to construct a Zero Trust framework to prevent GenAI from becoming an internal...]]></description>
    </item>
    <item>
      <title><![CDATA[What is AI Security? A Complete Enterprise Blueprint for Securing Machine Learning Ecosystems]]></title>
      <link>https://www.eresussec.com/en/blog/what-is-ai-security</link>
      <guid>https://www.eresussec.com/en/blog/what-is-ai-security</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[A deep dive into the complex world of AI Security. Understand the mechanics behind data poisoning, adversarial ML evasion, and prompt injection attacks...]]></description>
    </item>
    <item>
      <title><![CDATA[OWASP Top 10 for LLMs: The Definitive Guide to AI Vulnerabilities]]></title>
      <link>https://www.eresussec.com/en/blog/owasp-top-10-for-llm-vulnerabilities</link>
      <guid>https://www.eresussec.com/en/blog/owasp-top-10-for-llm-vulnerabilities</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Explore the official OWASP Top 10 for Large Language Models (LLMs). From Prompt Injection to Supply Chain Attacks, learn how to secure your enterprise...]]></description>
    </item>
    <item>
      <title><![CDATA[The Art of LLM Jailbreaking: Demystifying Offensive Prompt Engineering]]></title>
      <link>https://www.eresussec.com/en/blog/llm-jailbreaking-red-teaming-tactics</link>
      <guid>https://www.eresussec.com/en/blog/llm-jailbreaking-red-teaming-tactics</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[How do Red Teamers bypass the safety filters of Large Language Models? Dive deep into the manipulative art of LLM Jailbreaking, DAN prompts, and...]]></description>
    </item>
    <item>
      <title><![CDATA[AI Compliance Crisis: Navigating GDPR/KVKK in RAG Architectures]]></title>
      <link>https://www.eresussec.com/en/blog/gdpr-kvkk-compliance-for-rag-ai-models</link>
      <guid>https://www.eresussec.com/en/blog/gdpr-kvkk-compliance-for-rag-ai-models</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Discover the severe data privacy risks of Enterprise RAG models. Learn how to align Large Language Models with GDPR mandates like the 'Right to be...]]></description>
    </item>
    <item>
      <title><![CDATA[The Rise of Corporate Deepfakes and Vishing: AI-Powered Social Engineering]]></title>
      <link>https://www.eresussec.com/en/blog/deepfake-vishing-ai-social-engineering</link>
      <guid>https://www.eresussec.com/en/blog/deepfake-vishing-ai-social-engineering</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Discover how threat actors use Deepfakes and Voice Phishing (Vishing) for multi-million dollar corporate heists, and how to defend your enterprise.]]></description>
    </item>
    <item>
      <title><![CDATA[The Rise of the Certified AI Security Professional (CAISP): Reimagining Enterprise Pentesting]]></title>
      <link>https://www.eresussec.com/en/blog/certified-ai-security-professional</link>
      <guid>https://www.eresussec.com/en/blog/certified-ai-security-professional</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Traditional penetration testing cannot protect Machine Learning models. Learn why the Certified AI Security Professional (CAISP) is crucial for securing...]]></description>
    </item>
    <item>
      <title><![CDATA[Bug Bounties for AI Systems: Harnessing Crowdsourced Security for LLMs]]></title>
      <link>https://www.eresussec.com/en/blog/bug-bounty-for-ai-systems</link>
      <guid>https://www.eresussec.com/en/blog/bug-bounty-for-ai-systems</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Discover why traditional Bug Bounty programs fail for Generative AI, and how enterprises can launch crowdsourced vulnerability disclosure programs to...]]></description>
    </item>
    <item>
      <title><![CDATA[AI Supply Chain Attacks: The Hidden Trojans Inside Open-Source LLMs]]></title>
      <link>https://www.eresussec.com/en/blog/ai-supply-chain-attacks-huggingface</link>
      <guid>https://www.eresussec.com/en/blog/ai-supply-chain-attacks-huggingface</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Discover the severe threat of AI Supply Chain attacks via platforms like Hugging Face. How attackers leverage Pickle payloads and backdoored...]]></description>
    </item>
    <item>
      <title><![CDATA[AI Safety vs. AI Security: Understanding the Fundamental Differences in Enterprise ML]]></title>
      <link>https://www.eresussec.com/en/blog/ai-safety-vs-ai-security</link>
      <guid>https://www.eresussec.com/en/blog/ai-safety-vs-ai-security</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Discover the critical distinctions between AI Safety (protecting humans from AI) and AI Security (protecting AI from malicious threat actors and hackers).]]></description>
    </item>
    <item>
      <title><![CDATA[AI-Orchestrated Cyber Espionage: The Dawn of Autonomous APT Campaigns]]></title>
      <link>https://www.eresussec.com/en/blog/ai-orchestrated-cyber-espionage</link>
      <guid>https://www.eresussec.com/en/blog/ai-orchestrated-cyber-espionage</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Discover how Advanced Persistent Threats (APTs) weaponize Generative AI and autonomous agents to conduct hyper-scalable, undetectable cyber espionage...]]></description>
    </item>
    <item>
      <title><![CDATA[What Is AI Data Governance and Why Is It So Hard to Implement?]]></title>
      <link>https://www.eresussec.com/en/blog/ai-data-governance-challenges</link>
      <guid>https://www.eresussec.com/en/blog/ai-data-governance-challenges</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[AI data governance is the missing link in Enterprise AI Security. Learn why traditional Data Loss Prevention (DLP) fails when applied to LLMs and how to...]]></description>
    </item>
    <item>
      <title><![CDATA[How AI Coding Assistants Like Cursor Expose Secrets: The Unseen Agentic Risk]]></title>
      <link>https://www.eresussec.com/en/blog/ai-coding-assistants-security-risks</link>
      <guid>https://www.eresussec.com/en/blog/ai-coding-assistants-security-risks</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Discover the critical AI Security risks associated with autonomous coding tools. Learn how Cursor, Copilot, and Claude can inadvertently leak your .env...]]></description>
    </item>
    <item>
      <title><![CDATA[TensorFlow Custom Operator Injection (Graph Execution)]]></title>
      <link>https://www.eresussec.com/en/blog/pait-tf-200</link>
      <guid>https://www.eresussec.com/en/blog/pait-tf-200</guid>
      <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Identifies backdoor threats leveraging embedded malformed computational nodes (Custom Operators) within TensorFlow models to silently trigger execution...]]></description>
    </item>
    <item>
      <title><![CDATA[TorchScript Model Arbitrary Code Execution Detected at Model Load Time]]></title>
      <link>https://www.eresussec.com/en/blog/pait-tchst-300</link>
      <guid>https://www.eresussec.com/en/blog/pait-tchst-300</guid>
      <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Critical security vulnerability detailing explicit Remote Code Execution (RCE) occurrences triggered dynamically during TorchScript model initialization...]]></description>
    </item>
    <item>
      <title><![CDATA[Python Pickle Arbitrary Code Execution Detected]]></title>
      <link>https://www.eresussec.com/en/blog/pait-pkl-100</link>
      <guid>https://www.eresussec.com/en/blog/pait-pkl-100</guid>
      <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Discover how Python's built-in Pickle serialization module enables severe Arbitrary Code Execution (ACE) vulnerabilities within machine learning...]]></description>
    </item>
  </channel>
</rss>