Secure GenAI
Secure GenAI Podcast
Gemini Jack, PostQuantum Encryption + AI, AI Secure by Design, Google secures agentic browsing, 10,000+ Docker images leak secrets.
0:00
-4:22

Gemini Jack, PostQuantum Encryption + AI, AI Secure by Design, Google secures agentic browsing, 10,000+ Docker images leak secrets.

GenAI Safety & Security | Dec 7 - Dec 14, 2025

If you enjoy our newsletter, please consider to be a paid subscriber to help us keep more news and updates coming out.

Secure GenAI is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.

Highlights

  • GeminiJack.

  • PostQuantum Encryption + AI.

  • AI Secure by Design.

  • Google secures agentic browsing.

  • 10,000+ Docker images leak secrets.


Deep Dive

GeminiJack Noma Security

  • Targeted Google Gemini Enterprise.

  • Exploits indirect prompt injection.

  • Malicious prompts hide in files.

  • AI forced to leak data.

  • Google resolved this specific issue.

  • Similar attacks are likely on others.

  • Specialized security layers required.

  • Shadow IT increases risk.

  • Future breaches could be unrecoverable.

PostQuantum Encryption + AI SecurityBoulevard

  • Quantum computers break encryption.

  • Attackers can poison training data.

  • Model inversion steals sensitive secrets.

  • Adversarial inputs trick AI.

  • Behavioral analysis detects anomalies.

  • Monitor latency and variance.

  • Implement post-quantum security frameworks.

  • Adopt post-quantum cryptography immediately.

AI Secure by Design PaloAlto Networks

  • Adoption outpaces security measures.

  • Legacy tools miss AI threats.

  • Attacks manipulate AI’s probabilistic logic.

  • The government mandates secure AI design.

  • New roadmap bridges policy gap.

  • Must secure agents and infrastructure.

  • Purpose-built strategies replace retrofitting.

  • Security instills trust in AI.

Google secures agentic browsing BleepingComputer

  • “User Alignment Critic” vets actions.

  • The secondary model prevents prompt injection.

  • Origin Sets restrict data access.

  • Sensitive tasks require user approval.

  • Real-time scanning blocks malicious prompts.

  • Automated red-teaming tests defenses.

  • $20,000 bounty for security researchers.

10,000+ Docker images leak secrets TheRegister

  • Fortune 500s and banks exposed.

  • AI tokens are frequent leaks.

  • Shadow IT bypasses corporate security.

  • Personal accounts host enterprise secrets.

  • Deleted files don’t revoke keys.

  • 75% of keys remain active.

  • Automated scanners harvest exposed keys.

Thanks for reading Secure GenAI ! This post is public so feel free to share it.

Share

Discussion about this episode

User's avatar

Ready for more?