Containment analysis, and mitigation of the “Shai Hulud” supply chain malware campaign

1. Summary This advisory constitutes a analysis of the “Shai Hulud” malware campaign, a sophisticated, self-replicating supply chain attack targeting the JavaScript/TypeScript (NPM) ecosystem. This threat poses a critical and active risk to the Dutch public sector’s Continuous Integration/Continuous Deployment (CI/CD) pipelines, particularly within the context of the Judiciary (Rechtspraak), Read more

From myth to practice security engineering code security and SDLC for modern software teams

Summary The domain of security engineering is currently undergoing a structural transformation of a magnitude not seen since the transition from perimeter-based security to cloud-native architectures. As we navigate the latter half of the 2020s, the traditional “gatekeeper” model of information security characterized by manual reviews, adversarial relationships with engineering, Read more

Infographic AI-Orchestrated Cyber-Espionage

AI-Orchestrated Cyber-Espionage Analysis Reverse Engineering AI-Orchestrated Cyber-Espionage An interactive analysis of AI-powered attack techniques and strategic defense recommendations for modern security operations. Overview & Impact AI Attack Lifecycle Defensive Gaps Team Operations Strategic Recommendations The New Threat Landscape This application synthesizes research on the emerging threat of AI-orchestrated cyber-espionage. Based Read more

AI-Orchestrated Cyber-Espionage Campaigns

I. The Agentic Threat Inflection Point This report analyzes a fundamental and irreversible transformation in the cybersecurity landscape, crystallized by the public disclosure of the GTG-1002 incident by Anthropic in November 2025.1 This event, attributed with high confidence to the Chinese state-sponsored group GTG-1002, marks a definitive inflection point.1 It Read more

M365 Copilot attack surface

M365 Copilot Attack Surface M365 Copilot Attack Surface Summary Attack Chain Detections Governance Methodology Executive Summary This application provides an interactive analysis of the Microsoft 365 Copilot attack surface, based on internal research report v1.2. It translates the technical findings into an explorable format, focusing on new threat vectors, detection Read more

The Microsoft 365 Co-pilot attack surface. 

An Investigation into CompanyXYZGPT Enterprise Threats A New Class of Enterprise Risk for every company rushing into FOMO CompanyXYZGPT. The introduction of Microsoft 365 Copilot represents more than an incremental update to enterprise productivity software; it is a fundamental architectural transformation that redefines the corporate attack surface. By weaving a Read more

The 2025 security operations 

Deel I: Roadmap 1.1. Van het beveiligen van infrastructuur naar het besturen van intelligentie De kern van cyberbeveiliging ondergaat in 2025 een fundamentele transformatie. De focus verschuift van het verdedigen van statische, definieerbare perimeters naar het beheersen van de risico’s die inherent zijn aan autonome, intelligente en diep onderling verbonden Read more

Beveiligingsanalyse van het MCP-ecosysteem

by Dennis Landman Agentic Engineer & AI & Cybersecurity Specialist Deze analyse is een vervolg op eerdere analyses van MCP:1. Security en privacy risico’s van Model Context Protocol (MCP).– https://djimit.nl/security-en-privacy-risicos-van-model-context-protocol-mcp/2. Een analyse van opkomende communicatieprotocollen voor multi-agent AI systemen MCP, A2A, ACP en ANP– https://djimit.nl/een-analyse-van-opkomende-communicatieprotocollen-voor-multi-agent-ai-systemen-mcp-a2a-acp-en-anp/ Organisaties die het Model Context Read more

AI security, governance, agent systems, and conceptual breakthroughs.

1. EchoLeak Forensic Blueprint (AI Security / Semantic Injection) Prompt: Conduct a forensic reconstruction of EchoLeak (CVE-2025-32711). Reconstruct the attacker’s path, the AI’s misaligned logic, and the pipeline design flaw that enabled semantic leakage. Recommend a blueprint redesign based on layered semantic firewalls and trust compartmentalization to prevent zero-click prompt injection. Read more