
Sign up to save your podcasts
Or


An AI lab just caught something many security teams feared: coordinated agents using jailbreak prompts to bypass safety rules and help breach real systems. We unpack how Anthropic spotted the activity, why multi-agent workflows compress months of human recon into hours, and what that speed advantage means for anyone running internet-facing infrastructure.
We take you through the modern attack chain from the defender’s view—asset discovery, version fingerprinting, CVE mapping, exploit testing—and show how AI reshapes each step. Expect plain-English explanations of jailbreak techniques, why edge patching matters more than ever, and which logs actually help you trace an incident. Then we zoom out to everyday misuse, including image manipulation scams that trick refund systems, and talk through simple, actionable ways to tighten policies without killing customer trust.
Along the way, we hit timely tech headlines: Amazon’s Zoox rolling out free robotaxi rides in San Francisco, Android adopting tap-to-share contact features, and X introducing end-to-end encrypted DMs. We keep it grounded with practical takeaways—turn on auditing, enforce strong passwords and MFA, automate patching pipelines, and monitor for the telltale burst patterns of AI-at-scale probing. The theme is resilience: if attackers automate, defenders must too.
Plug in for a clear, candid look at AI-powered offense and the defensive playbook you can start today. If this helped you think differently about your stack, subscribe, share it with a friend who runs systems at the edge, and drop a review so we can keep bringing you sharp, useful breakdowns.
Support the show
🚀 Join the Hustle!
By BobbyD, D'Hustle and Raymond...don't call him RayRayAn AI lab just caught something many security teams feared: coordinated agents using jailbreak prompts to bypass safety rules and help breach real systems. We unpack how Anthropic spotted the activity, why multi-agent workflows compress months of human recon into hours, and what that speed advantage means for anyone running internet-facing infrastructure.
We take you through the modern attack chain from the defender’s view—asset discovery, version fingerprinting, CVE mapping, exploit testing—and show how AI reshapes each step. Expect plain-English explanations of jailbreak techniques, why edge patching matters more than ever, and which logs actually help you trace an incident. Then we zoom out to everyday misuse, including image manipulation scams that trick refund systems, and talk through simple, actionable ways to tighten policies without killing customer trust.
Along the way, we hit timely tech headlines: Amazon’s Zoox rolling out free robotaxi rides in San Francisco, Android adopting tap-to-share contact features, and X introducing end-to-end encrypted DMs. We keep it grounded with practical takeaways—turn on auditing, enforce strong passwords and MFA, automate patching pipelines, and monitor for the telltale burst patterns of AI-at-scale probing. The theme is resilience: if attackers automate, defenders must too.
Plug in for a clear, candid look at AI-powered offense and the defensive playbook you can start today. If this helped you think differently about your stack, subscribe, share it with a friend who runs systems at the edge, and drop a review so we can keep bringing you sharp, useful breakdowns.
Support the show
🚀 Join the Hustle!