If you enjoy our newsletter, please consider to be a paid subscriber to help us keep more news and updates coming out.
Notice: The Book Report Q4, 2025 is available! Download here.
Highlights
Codex Security AgentAI warfareUS CyberfareThreat actors use AICyberStrikeAI
Deep Dive
Codex Security Agent OpenAI
Finds complex vulnerabilities
Provides actionable security fixes
Uses AI agentic reasoning
Builds project threat models
Validates issues in sandbox
AI warfare The Guardian
Iran conflict shows paradigm shift
AI speeds battlefield decisions
Identifies military targets
Recommends weapons choices
Evaluates strike legality
Human oversight weakening
US cyberspace WhiteHouse
Adopt zero-trust architecture
Deploy post-quantum cryptography
Use AI-powered cyber defense
Protect critical infrastructure systems
Secure energy and telecom networks
Build national cyber workforce
Threat actors use AI Microsoft
Reduces technical attack barriers
Researching CVEs with LLMs
Reverse proxies and tunneling setups
Deepfakes enhance impersonation attacks
Voice cloning enables vishing scams
Prompt injection attacks increasing
CyberStrikeAI BleepingComputer
Used in FortiGate hacking campaign
Open-source AI security platform
Uses AI orchestration engine
Supports GPT, Claude, DeepSeek
Firewalls and VPNs targeted
Automates cyberattack workflows





![[Available] Book Report Q3, 2025](https://substackcdn.com/image/fetch/$s_!HI5v!,w_140,h_140,c_fill,f_auto,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62b0655a-9a73-4382-8201-d9007269e7ad_900x900.jpeg)








