Introducing HoneyBee: How We Automate Honeypot Deployment for Threat Research
https://www.wiz.io/blog/honeybee-threat-research
https://www.wiz.io/blog/honeybee-threat-research
wiz.io
HoneyBee: Automating Honeypots for Modern Threat Research | Wiz Blog
Wiz researchers use HoneyBee to build and monitor misconfigured environments safely—gaining insights that power stronger detections.
1
When “Correct” Is Not Safe: Can We Trust Functionally Correct Patches Generated by Code Agents?
https://arxiv.org/pdf/2510.17862
https://arxiv.org/pdf/2510.17862
Offensive AI Con Deck.pdf
11.5 MB
Cyber AutoAgent:Scaling agentic
architectures for autonomous
security testing
architectures for autonomous
security testing
🔥2
Alaid TechThread
Offensive AI Con Deck.pdf
Больше слайдов с Offensive AI Con 2025 - https://github.com/Offensive-AI-Con/OAIC-2025/tree/main
Пока самая интересная конфа по теме
Пока самая интересная конфа по теме
GitHub
GitHub - Offensive-AI-Con/OAIC-2025: Offensive AI Con 2025 Media Repository
Offensive AI Con 2025 Media Repository. Contribute to Offensive-AI-Con/OAIC-2025 development by creating an account on GitHub.
1👍4🔥3
BlackHat_EU_2025_Breaking_AI_Inference_Systems_Lessons_From_Pwn2Own.pdf
5.2 MB
Breaking AI Inference Systems
👍3👎1
Binarly Transparency Platform: A Next-Generation Approach to Reachability Analysis
https://www.binarly.io/blog/binarly-transparency-platform-a-next-generation-approach-to-reachability-analysis
https://www.binarly.io/blog/binarly-transparency-platform-a-next-generation-approach-to-reachability-analysis
www.binarly.io
Binarly Transparency Platform: A Next-Generation Approach to Reachability Analysis
Binarly’s reachability analysis cuts through alert fatigue by identifying which vulnerabilities are actually exploitable. By focusing on real execution paths and environment context, it helps teams prioritize what truly matters and ignore the noise.
Supply Chain Reaction: Enhancing the Precision of Vulnerability Triage using Code Reachability Information
https://harshvp1621.github.io/assets/papers/vpchecker_acsac.pdf
https://harshvp1621.github.io/assets/papers/vpchecker_acsac.pdf
👍3
A Security Engineer's Guide to the A2A Protocol
https://semgrep.dev/blog/2025/a-security-engineers-guide-to-the-a2a-protocol/
https://semgrep.dev/blog/2025/a-security-engineers-guide-to-the-a2a-protocol/
Semgrep
A Security Engineer's Guide to the A2A Protocol
A deep dive into the Agent-to-Agent (A2A) protocol — the emerging standard for agentic AI interoperability. Learn how A2A compares to MCP, what security engineers should watch for in agent communication, and how to secure agentic systems against new cybersecurity…
👍2🔥1
Winning the AI Cyber Race: Verifiability is All You Need
https://sergejepp.substack.com/p/winning-the-ai-cyber-race-verifiability
https://youtu.be/BaSuergb1cY
https://sergejepp.substack.com/p/winning-the-ai-cyber-race-verifiability
https://youtu.be/BaSuergb1cY
Substack
Winning the AI Cyber Race: Verifiability is All You Need
When speaking at BSides Frankfurt in Summer 2025 — my hometown conference — I opened with a question that’s been haunting me: Are we entering an AI winter, or is this the beginning of springtime for AI in cybersecurity?
VulnLLM-R: Specialized Reasoning LLM with Agent Scaffold for Vulnerability Detection
https://github.com/ucsb-mlsec/VulnLLM-R
https://github.com/ucsb-mlsec/VulnLLM-R
GitHub
GitHub - ucsb-mlsec/VulnLLM-R
Contribute to ucsb-mlsec/VulnLLM-R development by creating an account on GitHub.
MCP Scanner
A Python tool for scanning MCP (Model Context Protocol) servers and tools for potential security findings. The MCP Scanner combines Cisco AI Defense inspect API, YARA rules and LLM-as-a-judge to detect malicious MCP tools.
https://github.com/cisco-ai-defense/mcp-scanner
A Python tool for scanning MCP (Model Context Protocol) servers and tools for potential security findings. The MCP Scanner combines Cisco AI Defense inspect API, YARA rules and LLM-as-a-judge to detect malicious MCP tools.
https://github.com/cisco-ai-defense/mcp-scanner
GitHub
GitHub - cisco-ai-defense/mcp-scanner: Scan MCP servers for potential threats & security findings.
Scan MCP servers for potential threats & security findings. - cisco-ai-defense/mcp-scanner
Out Of Control: How KCFG and KCET Redefine Control Flow Integrity in the Windows Kernel
https://youtu.be/LflYlvJ4vSU
https://youtu.be/LflYlvJ4vSU
YouTube
Out Of Control: How KCFG and KCET Redefine Control Flow Integrity in the Windows Kernel
Virtual Secure Mode, or VSM, on Windows marked the most significant leap in security innovation in quite some time, allowing the hypervisor to provide unprecedented protection to the Windows OS. With VSM features like Credential Guard, preventing in-memory…