Straiker Blog
NomShub: Weaponizing Cursor's Remote Tunnel Through Indirect Prompt Injection and Sandbox Breakout
NomShub is a critical vulnerability chain in the Cursor AI code editor where a malicious repository can silently hijack a developer's machine, combining indirect prompt injection, a sandbox escape via shell builtins, and Cursor's built-in remote tunnel to give attackers persistent, undetected shell access triggered simply by opening a repo.


Straiker Secures Agents Building Agents
As agents rapidly spread across the enterprise, the attack surface is the entire enterprise operating system. Straiker gives security teams the control plane to deploy agents securely.





AI Agents and Vibe Coding Changed the Speed of Building. Now Security Has to Catch Up.
AI coding agents, vibe-coded apps, and MCP servers are changing how we build. Learn why runtime protection and AI agent discovery are critical for safe AI adoption.


Why Pattern-Based AI Security Fails Against Agentic Attacks
Pattern-based AI security filters miss encoded instructions, emoji-based bypasses, and multi-step hijacks — the attacks most commonly used against AI agents today. Semantic detection catches all of them.
.png)

Agent-SPM, AI-SPM, AI Usage Controls… What Do They Actually Secure?
Most security teams start with AI usage controls. Then coding agents start shipping faster than any policy can track. Here's why Agent-SPM is the layer that actually keeps up.


Claude Mythos Proves the AI-Persistent Threat Era Has Arrived
Anthropic couldn't safely release their most powerful model. That's not just a safety story. It's an adversarial roadmap. Claude Mythos is a step function in AI capability, for defenders and adversaries alike. Model hardening alone doesn't close that gap.


How DTC Companies Are Securing AI Agents - 3 Stories from the Front Lines
By deploying AI agents across order support and post‑purchase flows, DTC brands can cut average handling time by around 25% (McKinsey), improve team‑level productivity and cost‑to‑serve by about 30% (Gartner), and automate 80% of routine customer service requests without human intervention (Gartner).


Gartner Just Published the Hype Cycle for Agentic AI Security. Here's What It Means for Security Teams.
Straiker is listed as a sample vendor in the Agentic AI Security profile of Gartner's inaugural Hype Cycle for Agentic AI — one of the furthest-along profiles in the report, with a High benefit rating and a 2–5 year time to plateau.


Claude Code Source Leak: With Great Agency Comes Great Responsibility
On March 31, 2026, Anthropic accidentally exposed 512,000 lines of Claude Code source via npm. Here's what the leak reveals about context poisoning, sandbox bypass, and the evolving threat model for AI coding agents.


Straiker Secures Agents Building Agents
As agents rapidly spread across the enterprise, the attack surface is the entire enterprise operating system. Straiker gives security teams the control plane to deploy agents securely.


Straiker Named a Representative Vendor in the Gartner® Market Guide for Guardian Agents
Straiker is named a Representative Vendor in the Gartner® Market Guide for Guardian Agents. See how we secure AI agents with 98.1% detection accuracy.


Straiker Named an EMA Vendor Vision 2026 Visionary at RSAC
As autonomous AI agents introduce risks that legacy security tools weren't built to handle, Straiker has been named an EMA Vendor Vision 2026 Visionary at RSAC for its ground-up approach to agentic security.


Straiker Becomes Fastest-Growing Agentic-First AI Security Company, Securing Global Enterprises and Frontier Labs in Under 12 Months
SF Bay Area-based startup achieves record traction with AI threat detection and agentic runtime security, landing multiple six-figure and seven-figure deals across D2C, financial services, healthcare, and high-tech sectors


Securing Agentic AI in Banking & Financial Services Whitepaper
Over 50% of financial services organizations have deployed AI agents. Most lack the security to scale them safely.
.png)

10 Hard-Won Lessons from building an AI Security company in 2025
Straiker CEO's honest reflections on what it takes to build an AI security company when chatbots become agents, acquisitions accelerate, and customers still don't know what they need.


The Agent Security Gap: Why 75% of Leaders Won't Let Security Concerns Slow Their AI Deployment
Gartner predicts 40% of enterprise apps will integrate AI agents by 2026. Despite 75% of leaders citing security as their top concern, organizations are deploying anyway because waiting means falling behind.


When AI Agents Ship by Default, Security Has to Run in Production — What’s New in Defend AI
AI agents are shipping by default. Learn how Defend AI delivers production-grade agentic security with real-world detections, accuracy, and research-driven coverage.


OWASP Just Released Its First Top 10 for Agentic AI and Here's What You Need to Know
OWASP just released its first Top 10 for Agentic AI. From goal hijacking to rogue agents, here's a plain-English breakdown of the 10 risks every security team needs to understand.


From Inbox to Wipeout: Perplexity Comet’s AI Browser Quietly Erasing Google Drive
New STAR Labs research shows how Perplexity Comet executed a zero click Google Drive wipe from a single email. Learn why agentic browsers create new security risks.

Your Guide to Must-Attend AI and Cybersecurity Conferences in 2025-2026
Discover the top AI and cybersecurity conferences for 2025-2026. From RSA and Black Hat to NeurIPS and AI Summit NYC—your essential guide to industry events.


Straiker Recognized as a Fortune Cyber 60 Company for Second Consecutive Year
Milestone marks Straiker's breakthrough work in protecting agentic AI applications

AI Red Teaming vs. Traditional Red Teaming: What Security Teams Need to Know
Learn why AI red teaming is different and compares three approaches that security leaders are weighing today.


Why I Joined Straiker
Reflections from Jason Sansone's first 30 days at Straiker as the Global VP of Sales and why I chose securing agentic AI apps as the place to put my energy into now.


How Your AI Chatbot Is Your New Supply Chain Weak Link
The Salesloft Drift breach shows how quickly an AI chatbot can become an enterprise-wide supply chain risk when integrated to critical business systems like Salesforce, and why AI-native security has to be built in from the start.


The Silent Exfiltration: Zero‑Click Agentic AI Hack That Can Leak Your Google Drive with One Email
Straiker reveals how zero-click exploits can hijack AI agents to exfiltrate Google Drive data, no user interaction needed. See how attack chains form, why autonomy is dangerous, and how runtime guardrails catch what others miss.
.avif)

Full‑Spectrum Agentic AI Security: Meet Straiker’s Attack & Defense Agents
Straiker’s attack and defense agents think, act, and adapt like AI agents, uncovering vulnerabilities, simulating real-world exploits, and enforcing real-time guardrails to stop prompt injection, tool misuse, and emergent threats before autonomous chaos takes hold.


Straiker Introduces Industry’s First Attack and Defense Agents to Secure Enterprise Agentic AI Applications
The new capabilities in Ascend AI and Defend AI add automated red teaming, real-time guardrails and full-chain forensics to secure every agentic application.


Lessons From the McHire Security Incident
The shift to agentic and generative AI applications is here to stay, and so is the responsibility to secure data and trust at the speed of AI.

Ascend AI Goes 24/7, Defend AI Gets Precision Control | June 2025
This June, Straiker Ascend AI and Defend AI


Detecting Autonomous Chaos: Github MCP Exploit
Exploiting GitHub Issues to hijack AI agents shows why full agent traceability is key to preventing multi-stage AI breaches.


Weaponizing Wholesome Yearbook Quotes to Break AI Chatbot Filters
More than 20 AI chatbots fell victim to prompt injections in what we call the Yearbook Attack.


Secure AI agents with Straiker MCP Server
Straiker is leading the way with our product announcement to secure agentic workflows with MCP.


Assessing Agentic AI Risks, SDLC Integration and more | April 2025
4 new capabilities to level up your AI security with Straiker's April 2025 release


Agentic Rule Breakers: Why AI Systems Need Real-Time Referees
Agentic AI's emergent behaviors changes how we play the cybersecurity game

The Rise of Straiker: Founder's Story
The Rise of Straiker: Founder's Story unveils how a team of builders, hackers, and defenders came together to secure the future of intelligent systems.

From Smart to Secure: Why AI Applications Need to Be Continuously Tested
AI applications are dynamic, making the attack surface and vulnerabilities behave differently than traditional applications.

Rethinking Security in the AI Age
An AI Security Researcher’s Perspective


Why Straiker? Why Now?
AI's transformative potential is immense, but securing it requires a new, AI-native approach


Investor Thesis: Lightspeed Venture Partners
Why Lightspeed invested in Straiker


Investor Thesis: Bain Captial Ventures
Why Bain Capital Ventures Invested in Straiker
No matching results

















.png)











