top of page
Profile
Join date: May 3, 2025
Posts (34)
Feb 8, 2026 ∙ 4 min
The Ghost in the Machine: Why Your IDE’s Recommendations Are the Next Supply Chain Attack Surface
1. A Quiet Near-Miss in the Software Supply Chain In January 2026, the security community caught a glimpse of the future of software supply chain attacks. It was not a zero-day exploit, a malicious dependency, or a leaked signing key. It was something far more mundane, and far more dangerous: a name. Koi Security disclosed a subtle but serious weakness affecting several popular AI-powered IDEs, including Cursor, Windsurf, and Google Antigravity. These tools inherit Visual Studio Code’s...
4
0
Jan 21, 2026 ∙ 4 min
Conducting a Comprehensive Vulnerability Assessment Process
In today’s digital landscape, organisations face an ever-growing array of cyber threats. To protect sensitive data and maintain operational integrity, it is essential to conduct a thorough vulnerability assessment process. This process helps identify weaknesses in systems, networks, and applications before attackers can exploit them. Understanding how to perform a comprehensive vulnerability assessment is a critical step in strengthening your cybersecurity posture. Understanding the...
6
0
Jan 17, 2026 ∙ 4 min
The Persistence Problem: Why Agentic AI Demands a New Security Paradigm
The Industry Is Solving the Wrong AI Threats The industry is focused on blocking the wrong failures. While most AI security efforts concentrate on filtering toxic outputs and preventing obvious misuse, a far more dangerous class of risk is quietly emerging: instruction persistence . During a recent enterprise AI safety evaluation, we observed how a single, seemingly legitimate interaction could introduce instructions that persisted over time. These instructions shaped behaviour well beyond...
18
0
1
bottom of page
