[un]prompted 2026 – 1.8M Prompts, 30 Alerts: Hunting Abuse In A User-Defined Agent Ecosystem Authors, Creators & Presenters: Matt Rittinghouse, Lead Security Data Scientist At Salesforce & Millie Huang, Staff Security Data Scientist At Salesforce Our thanks to [un]prompted for…
Category: Security Boulevard
How Mythos Signals Cybersecurity Disruption
What is Mythos Mythos is Anthropic’s latest AI model, and it is stirring up a tornado of concern in cybersecurity circles. Even before its release, Mythos discovered thousands of new sensitive vulnerabilities in commercial and open-source software, including all major…
U.S. Officials Consider Three-Day Patch Rule in Wake of Anthropic’s Mythos
Reuters reported that U.S. cybersecurity officials are weighing cutting the time federal agencies have to fix critical vulnerabilities from two weeks to three days after Anthropic’s Mythos AI model raises the specter of even faster attacks. Security pros say the…
The AI Vulnerability Storm Is Here. Is Your Security Program Breach Ready?
How a new class of AI-powered attacks is redrawing the rules of cybersecurity, and why the organizations that survive will be those that build for containment, not just prevention. There is a moment in every technological shift when the future…
Randall Munroe’s XKCD ‘Centimeter Wavelengths’
via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Centimeter Wavelengths’ appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Randall Munroe’s…
[un]prompted 2026 – Why Most ML Vulnerability Detection Fails
Author, Creator & Presenter: Jenny Guanni Qu, AI Researcher At Pebblebed Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations’ YouTube Channel. Permalink The post [un]prompted 2026 –…
FlowCarp Identifies Protocols
I am thrilled to announce the release of a brand new tool called FlowCarp! FlowCarp is a simple command line tool that performs a very complicated task. It identifies the application layer protocol in network traffic without relying on port…
Ten Great Cybersecurity Job Opportunities
Security Boulevard is now providing a weekly cybersecurity jobs report through which opportunities for cybersecurity professionals will be highlighted as part of an effort to better serve our audience. Our goal in these challenging economic times is to make it…
EasyDMARC and KnowBe4 Partner to Advance Proactive Email Security as Phishing Fuels More Than One-Third of Cyberattacks
Originally published at EasyDMARC and KnowBe4 Partner to Advance Proactive Email Security as Phishing Fuels More Than One-Third of Cyberattacks by Anush Yolyan. Dover, Delaware and Tampa Bay, Florida | May … The post EasyDMARC and KnowBe4 Partner to Advance…
Local Guardrails for Secrets Security in the Age of AI Coding Assistants
Modern developer environments expose sensitive context across files, prompts, logs, and commands. Learn how layered local controls reduce secrets risk. The post Local Guardrails for Secrets Security in the Age of AI Coding Assistants appeared first on Security Boulevard. This…
CAF Objectives Overview for UK SMEs: A Practical Guide to the NCSC Cyber Assessment Framework
CAF Objectives Overview for UK SMEs: A Practical Guide to the NCSC Cyber Assessment Framework If you are a UK SME, the NCSC Cyber Assessment Framework, usually shortened to CAF, can look more formal than it needs to be. In…
ShinyHunters Claims Responsibility for Breach of EdTech Company Instructure
The prolific extortion group ShinyHunters claimed responsibility for the breach of Edtech vendor Instructure’s systems, stealing 3.65 TB of sensitive information, including names, email addresses, and messages of students, teachers, and others. ShinyHunters also reportedly behind an early attack of…
The Half of Agent Security You’re Not Governing
The governance of AI agents faces a fundamental asymmetry: while MCP servers provide structured logs, the “Skills” that drive agent reasoning remain forensic black holes. As high-risk capabilities—such as arbitrary code execution and state changes—become prevalent in nearly 60% of…
Handling User Documents Securely in Authentication and Onboarding Systems
Learn how to securely handle user documents in authentication and onboarding systems to protect data, ensure compliance, and prevent breaches. The post Handling User Documents Securely in Authentication and Onboarding Systems appeared first on Security Boulevard. This article has been…
AI for Security Infrastructure: Rebalancing Cybersecurity for the Decade Ahead
An exploration of the shift from reactive “assume breach” mentalities to AI-driven prevention, highlighting how Domain-Specific Language Models (DSLMs) empower security architects to eliminate configuration drift and tool sprawl. The post AI for Security Infrastructure: Rebalancing Cybersecurity for the Decade Ahead …
Frameworks Don’t Build Trust. Adoption Does
As AI evolves toward autonomy, the Cloud Security Alliance is launching the STAR for AI Catastrophic Risk Annex to codify auditable controls for agentic systems The post Frameworks Don’t Build Trust. Adoption Does appeared first on Security Boulevard. This article…
A week in security (April 27 – May 3)
A list of topics we covered in the week of April 27 to May 3 of 2026 The post A week in security (April 27 – May 3) appeared first on Security Boulevard. This article has been indexed from Security…
True Threats and True Crimes – Those Memes You Post Might Be Crimes
Does reposting a “86 47” meme constitute a criminal threat? Analyzing the James Comey indictment through the lens of Counterman v. Colorado and Elonis v. United States. The post True Threats and True Crimes – Those Memes You Post Might…
Identity Risk Intelligence vs Threat Intelligence: What’s the Difference?
Introduction: Two terms, one growing confusion In cybersecurity conversations today, two terms are showing up more frequently: Threat Intelligence Identity Risk Intelligence At a glance, they sound similar. Both deal with data, risk, and security insights. But they solve fundamentally…
[un]prompted 2026 – The Parseltongue Protocol: Textual Obfuscation Methods
Author, Creator & Presenter: Joey Melo, AI Red Teaming Specialist At CrowdStrike Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations’ YouTube Channel. Permalink The post [un]prompted 2026…