Reading Between the Pixels: Failure Modes in Vision Language Models
6 min read
This post is Part 2 of a two-part series on multimodal typographic attacks. In Part 1 of “Reading Between the Pixels,” we demonstrated that text–image embedding distance correlates with typographic prompt injection success: conditions that push....
Defining Model Provenance: A Constitution for AI Supply Chain Safety and Security
5 min read
When it comes to AI models, one of the hardest questions to answer is deceptively simple: where did this model actually come from? We addressed part of this problem with Model Provenance Kit, an open-source tool that fingerprints models at the.....
Introducing Model Provenance Kit: Know Where Your AI Models Come From
7 min read
The importance of understanding a model’s origins has been a frequent topic of discussion among researchers and industry experts, and our own AI research confirms that AI supply chain security remains a weak link. Tracking where models come from....
Cisco’s MCP Scanner Introduces Behavioral Code Threat Analysis
4 min read
A model context protocol (MCP) tool can claim to execute a benign task such as “validate email addresses,” but if the tool is compromised, it can be redirected to fulfill ulterior motives, such as exfiltrating your entire address book to an external server. Traditional security scanners could flag suspicious network calls or dangerous functions and […]
Securing AI Agents with Cisco’s Open-Source A2A Scanner
3 min read
The Rise of Agent Networks: A New Security Frontier Emerging Agent-to-Agent (A2A) frameworks have emerged to support organizations as they move from isolated AI applications to interconnected networks of autonomous agents. A2A enables software agents to discover, authenticate, and collaborate across organizational boundaries, unlocks unprecedented automation capabilities. A2A also introduces an expanded attack surface, and […]