Loading posts ...

Building A Mythos-Ready Security Program

Building a Mythos-Ready Security Program: Key Takeaways from the field with Real-World Implementation As AI continues to reshape the cybersecurity landscape, the gap between vulnerability discovery and exploitation is shrinking rapidly across enterprises. The release…
Read More

Enterprise Agent Governance

Enterprise Agent Governance: Monitoring AI Coding Agents Without Stifling Productivity The continued rise of AI coding agent tools such as Claude Code, Devin, and Cursor…
Read More

Offensive AI Security

AI-Enabled Offensive Cyber Operations: Capabilities and Risks AI is continuing to transform offensive cyber capabilities through advances in large language models (LLMs), autonomous agents, and…
Read More

Skills, Connectors, Plugins, Oh My: A Security Practitioner’s Map of the Claude Extension Ecosystem

TL;DR Three primitives, one trust radius. Skills, Connectors (MCP), and Plugins look like distinct architectural units but are effectively a bundle. A single plugin installation…
Read More

Introducing ClaudeSec: A Community Knowledge Hub for Claude Ecosystem Security

The Claude ecosystem has moved faster than the practical security guidance around it. Connectors, desktop extensions, managed agents, and new deployment surfaces are shipping weekly…
Read More

Agent Skills Supply Chain Risks

Supply Chain Risks of Agent Skills AI agents are rapidly evolving from simple automation tools into complex systems capable of performing a wide range of…
Read More

Inside Claude Managed Agents: Reverse-Engineering the Security Boundaries of Anthropic’s Hosted Agent Runtime

In our previous deep dive into Claude Cowork, we reverse-engineered Anthropic’s desktop agent – uncovering gVisor syscall filtering, MITM TLS inspection proxies, and a layered…
Read More