100% got a lot of friends in UA defense scene we invest in deftech but dont consider ourselves an expert for this – and imho it's an area you want experts not tourists my fav fund for this is
CYBERSECURITY
-
AI exploit discovery capabilities versus human performance and costs
By
–
No evidence so far that AI can find exploits a human couldn’t, or even do it at lower cost.
-
Geopolitical Propaganda and Polarization: National Decline Strategies
By
–
if that country (US, Russia, etc) spreads propaganda about your decline and intentionally polarizes the situation it is.
-
AI transforms fraud prevention for modern businesses
By
–
#Ad #MastercardPartner @mastercard 🔐 AI is changing fraud prevention fast, and businesses need to move faster too.
— Bernard Marr (@BernardMarr) 14 avril 2026
In this video, I explore how AI is reshaping the fraud landscape, why traditional approaches are starting to fall behind, and why smarter intelligence is becoming… pic.twitter.com/5Yeo8YnVjV#Ad #MastercardPartner @mastercard AI is changing fraud prevention fast, and businesses need to move faster too. In this video, I explore how AI is reshaping the fraud landscape, why traditional approaches are starting to fall behind, and why smarter intelligence is becoming
-
AI Agents Require Infrastructure and Security Strategy Overhaul
By
–
Your AI Strategy Needs A Rebuild Before Agents Break It #AI agents are moving from pilot projects into real business roles, but many companies are discovering that their #cloud #infrastructure, #security models, and #workflows were built for people, not #autonomous systems.
-
Cybersecurity Expert Transitions to Drone Hacking and AI
By
–
After 35 Years Fighting Hackers, This Cybersecurity Legend Is Now Hacking Drones! #BigData #Analytics #AI #MachineLearning #CyberSecurity #DataScience #IoT #IIoT #Python #RStats #TensorFlow #JavaScript #ReactJS #CloudComputing #Serverless #DataScientist #Linux #Programming
-

Enterprise Search: Deploying NVIDIA AI-Q for Secure Production
By
–
Moving enterprise search from a prototype to a secure, full-scale production environment is a complex hurdle. 🔍 There is a great step-by-step blueprint available for deploying the open-source NVIDIA AI-Q template to build scalable, "agentic" search stacks integrating private data. Read the Blog: developer.nvidia.com/blog/ho… #EnterpriseAI #LangChain @nvidia
→ View original post on X — @haroldsinnott, 2026-04-14 04:00 UTC
-
Security maintainer breaks something in codebase again
By
–
Sounds like one of the security focussed maintainers broke sth again.
-
Malicious Intermediary Attacks on LLM Agent Supply Chain Security
By
–
"Your Agent Is Mine: Measuring Malicious Intermediary Attacks on the LLM Supply Chain" The danger of agent security can also exist in the API router, that is between the agent and the provider. As these routers can read prompts, keys, and tool calls in plaintext, even rewrite
-

DeepAgents introduces filesystem permissions for secure resource management
By
–
🔒 new in deepagents: filesystem permissions shared resources and org-wide policies are exactly the kind of files you want your agent to read but never overwrite. filesystem permissions let you enforce that with simple declarative allow/deny rules!
→ View original post on X — @langchain, 2026-04-13 19:16 UTC