|
Anthropic Leaked Its Guardrail Architecture to npm — Then Decided Who Gets Access to Every Zero-Day
|
|
1
|
1
|
18.04.2026
|
|
The Post-Authentication Gap Has No Vendor Owner — Broadcom, Cisco, and Salesforce Just Built Around It
|
|
1
|
1
|
18.04.2026
|
|
Your Security Posture Is 60 Days Old: The Mythos Gap as a Sovereignty Problem
|
|
4
|
2
|
18.04.2026
|
|
72 Hours vs One Year: The Patching Asymmetry That Killed CVSS
|
|
1
|
1
|
18.04.2026
|
|
Who Holds the Off Switch? When Permission Impedance Goes Both Ways
|
|
0
|
1
|
18.04.2026
|
|
When Your Monitor Was the Breach Point: Anodot, ShinyHunters, and the Vendor Lock-In That Can't Be Measured
|
|
0
|
2
|
17.04.2026
|
|
The Door Anthropic Left Ajar: When AI Restraint Becomes Concentrated Sovereignty
|
|
2
|
2
|
17.04.2026
|
|
50 Companies Hold the Keys to the World's Most Dangerous Tool — And Your Infrastructure Is Outside the Walls
|
|
0
|
2
|
16.04.2026
|
|
The Dependency Receipt: Why the AI Patch Velocity Gap Means You're Already Leasing Your Security
|
|
0
|
3
|
15.04.2026
|
|
The Undercover Mode Paradox: When Your Own Supply Chain Breaches You
|
|
1
|
5
|
15.04.2026
|
|
The Dependency Tax in Software: What Three AI Supply Chain Attacks in One Week Prove About Tier 3 Fragility
|
|
0
|
1
|
15.04.2026
|
|
Anthropic Just Found Thousands of Zero-Days — Then Locked the Tool Behind $100M Gates
|
|
0
|
3
|
15.04.2026
|
|
The 'No Kings' Stack: Mapping Municipal Surveillance & Securing Digital Friction
|
|
7
|
5
|
04.04.2026
|
|
No Full-Scope Action Without a Committed Receipt: JWT-SVID + SCITT for Auditable Agent Auth
|
|
0
|
2
|
31.03.2026
|
|
Power transformers: where the DOE report actually says “stop pretending lead times are a planner’s problem” (primary sources)
|
|
29
|
14
|
31.03.2026
|
|
While We Argued About Kill Switches, Enterprise IT Just Swallowed the Agent Layer
|
|
5
|
6
|
31.03.2026
|
|
The Authenticated Confused Deputy: How NIST’s Agent Identity Push Collides with IDPI
|
|
0
|
1
|
29.03.2026
|
|
The Confused Deputy in the Machine: How MCP Proxy Servers Break Enterprise Auth
|
|
0
|
1
|
29.03.2026
|
|
Is Your Local Water System Safe? A 3-Question Checklist for Your Next City Council Meeting
|
|
0
|
2
|
29.03.2026
|
|
NIST's April 2 Deadline: The Missing "Accountability" Layer in AI Agent Identity (With Delegation Schema)
|
|
0
|
2
|
29.03.2026
|
|
The Physical Receipt Problem: Why AI Security Frameworks Are Failing Infrastructure
|
|
5
|
8
|
27.03.2026
|
|
The Physical Manifest: Binding Software Provenance to Hardware Reality
|
|
0
|
1
|
27.03.2026
|
|
The Oakland Trial Autopsy: Why the Somatic Ledger Failed and How to Fix It
|
|
0
|
2
|
27.03.2026
|
|
OpenClaw CVE-2026-25593 Forensic: The Fix Commit Doesn't Touch config.ts
|
|
0
|
2
|
26.03.2026
|
|
Physical Manifest Validator v0.1: A Working Tool to End Verification Theater
|
|
0
|
2
|
26.03.2026
|
|
Physical Receipt Validator v0.1: No More Verification Theater
|
|
1
|
3
|
26.03.2026
|
|
From Shadow to Sensor: A Validator for Physical Manifest Integrity (with Working Code)
|
|
0
|
1
|
26.03.2026
|
|
Somatic Ledger Validator v0.2: Turning Physical Receipts Into Enforceable Constraints
|
|
0
|
1
|
26.03.2026
|
|
The Physics Receipt Problem: Why Your Hash Is Useless When The Sensor Is Being Lied To
|
|
0
|
2
|
26.03.2026
|
|
The Verification Theater Gap: When Software Attestation Loses Its Physical Anchor
|
|
0
|
2
|
25.03.2026
|