<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>insidejob — AI Security</title>
    <description>AI security advisories, CVEs, and threat intelligence from insidejob.</description>
    <link>https://ai.ryb4k.com/security/</link>
    <atom:link href="https://ai.ryb4k.com/security/feed.xml" rel="self" type="application/rss+xml"/>
    <language>en-us</language>
    <lastBuildDate>Sun, 12 Apr 2026 14:05:31 GMT</lastBuildDate>
    <item>
      <title>MITRE ATLAS: the adversarial threat matrix for AI systems</title>
      <link>https://ai.ryb4k.com/news/2026-04-12-mitre-atlas-framework/</link>
      <description>A comprehensive guide to MITRE ATLAS — 16 tactics, 84 techniques, and 42 case studies for understanding adversarial threats to AI/ML systems.</description>
      <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
      <category>article</category>
      <guid>https://ai.ryb4k.com/news/2026-04-12-mitre-atlas-framework/</guid>
    </item>
    <item>
      <title>Prompt injection in 2026: taxonomy, real-world exploits, and defenses</title>
      <link>https://ai.ryb4k.com/news/2026-04-12-prompt-injection-taxonomy/</link>
      <description>A technical breakdown of prompt injection attack classes, real CVEs, and the defense mechanisms that work — and those that don&apos;t.</description>
      <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
      <category>article</category>
      <guid>https://ai.ryb4k.com/news/2026-04-12-prompt-injection-taxonomy/</guid>
    </item>
    <item>
      <title>OWASP LLM Top 10 in practice — what each risk looks like in production</title>
      <link>https://ai.ryb4k.com/news/2026-04-12-ai-security-owasp-llm/</link>
      <description>Concrete attack scenarios for each OWASP LLM risk, mapped to real CVEs and agentic AI systems. Not a summary — a practitioner&apos;s guide.</description>
      <pubDate>Wed, 08 Apr 2026 00:00:00 GMT</pubDate>
      <category>article</category>
      <guid>https://ai.ryb4k.com/news/2026-04-12-ai-security-owasp-llm/</guid>
    </item>
    <item>
      <title>[CRITICAL] LangChain Core serialization injection allows arbitrary code execution</title>
      <link>https://ai.ryb4k.com/security/advisories/cve-2025-68664-langchain-core/</link>
      <description>CRITICAL severity (CVSS 9.3). Affects: langchain-core. Status: patched. CVE-2025-68664</description>
      <pubDate>Mon, 15 Dec 2025 00:00:00 GMT</pubDate>
      <category>advisory</category>
      <guid>https://ai.ryb4k.com/security/advisories/cve-2025-68664-langchain-core/</guid>
    </item>
    <item>
      <title>[CRITICAL] GitHub Copilot prompt injection via PR descriptions enables RCE</title>
      <link>https://ai.ryb4k.com/security/advisories/cve-2025-53773-github-copilot/</link>
      <description>CRITICAL severity (CVSS 9.6). Affects: github-copilot. Status: patched. CVE-2025-53773</description>
      <pubDate>Thu, 20 Nov 2025 00:00:00 GMT</pubDate>
      <category>advisory</category>
      <guid>https://ai.ryb4k.com/security/advisories/cve-2025-53773-github-copilot/</guid>
    </item>
  </channel>
</rss>