About 35 results
Open links in new tab
  1. AI Security & Research Blog | Straiker

    Mar 27, 2025 · This blog maps AI maturity stages, compares integration models, and shows how Straiker delivers runtime guardrails across SDK, eBPF, proxy, and gateway options to secure …

  2. Cyberspike Villager – Cobalt Strike’s AI-native Successor

    Sep 11, 2025 · Straiker uncovers Villager, a Chinese-based pentesting framework that acts as an AI-powered framework in the style of Cobalt Strike, automating hacking and lowering the …

  3. Shift AI Risk Assessments Further Left and Multi-Modal Runtime ...

    New in this release: flexible CI/CD integration, comprehensive runtime document protection, and adaptable deployment options, enabling security teams to protect AI applications without …

  4. From Inbox to Wipeout: Perplexity Comet’s AI Browser Quietly …

    Dec 4, 2025 · In this blog, we’re going to unpack a new zero click agentic browser attack on Perplexity Comet that turns a friendly “please organize our shared Drive” email into a quiet …

  5. The Silent Exfiltration: Zero‑Click Agentic AI Hack That Can Leak …

    Aug 5, 2025 · Blog The Silent Exfiltration: Zero‑Click Agentic AI Hack That Can Leak Your Google Drive with One Email Share this on: Written by

  6. Straiker Introduces Industry’s First Attack and Defense Agents to ...

    Aug 5, 2025 · For more information, check out our blog on the product launch and research. Upcoming events: Black Hat USA, August 6-7: Booth #6222. Straiker's Head of AI Security …

  7. Why Straiker? Why Now? | Straiker

    Mar 27, 2025 · Straiker uncovers Villager, a Chinese-based pentesting framework that acts as an AI-powered framework in the style of Cobalt Strike, automating hacking and lowering the …

  8. Agentic Danger: DNS Rebinding Exposes Internal MCP Servers

    May 22, 2025 · In this blog, we’ll dissect how DNS rebinding attacks exploit Server-Sent Events (SSE), a protocol commonly used by MCP servers for real-time streaming communication to …

  9. Inside the AI Supply Chain: Securing Models, Prompts, and Plugin ...

    AI supply chain security inherits all the long-standing vulnerabilities of traditional software—open-source dependencies, CI/CD risks, and infrastructure weaknesses—while introducing new, AI …

  10. This is Straiker | Straiker

    Mar 26, 2025 · Watch the videoStraiker uncovers Villager, a Chinese-based pentesting framework that acts as an AI-powered framework in the style of Cobalt Strike, automating hacking and …