Mike Mosher's Avatar

Mike Mosher

@mjmosher.bsky.social

Cyber pro, serial CISO, wanna-be photographer Definitely NOT a bot (certified by Google and Cloudflare)

32 Followers  |  163 Following  |  24 Posts  |  Joined: 23.11.2024  |  1.972

Latest posts by mjmosher.bsky.social on Bluesky

Preview
Cybersecurity Predictions for 2026: The Future of Digital Threats Cybersecurity experts discuss 2026 predictions, highlighting the rise of AI-driven threats and the need for advanced security measures to combat risks.

Dark Reading reports that for 2026, security must shift from prevention to resilience. AI attacks are too fast for old methods. If you aren't spending 30% of your budget on recovery, you are behind. Focus on MTTR to protect shareholders.

www.darkreading.com/threat-intel...

04.01.2026 02:17 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

Me: β€œPolly, you can’t say that! Bad parrot! Say you’re sorry.”

🦜 Polly: *Awwkk* β€œBad parrot” *Awwkk* β€œSorry” *whistle* 🦜

Me: β€œOkay, Polly, don’t do it again.”

🦜 Polly: *Awwkk* β€œDo it again…do it again!” *Awwkk* *whistle* 🦜

03.01.2026 05:35 β€” πŸ‘ 4    πŸ” 3    πŸ’¬ 0    πŸ“Œ 2
Preview
#ai #agents #severance #engineering #security #sdd | Michael Mosher Thinking about "Severance" and AI Agents. If you've seen Severance, you know the horror of the "Innie." Waking up at work with no memory of the past. It’s a dystopian nightmare for humans. But it’s ...

www.linkedin.com/posts/michae...

10.12.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
The Amnesiac Intern Why AI Agents Need External Memory

open.substack.com/pub/northwoo...

10.12.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

We need to stop waiting for infinite context windows and start building better harnesses.
Give your digital interns a notebook that survives the reboot. 4/

#AI #AgenticWorkflows #Severance #Security #SDD

10.12.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

This is huge for Security.
Imagine a Red Team agent finding a bug. If it doesn't leave a perfect map (External Memory) for the next agent, you waste tokens and miss fixes.
The "Spec" isn't just instructionsβ€”it's the Agent's long-term memory. 3/

10.12.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

I read Anthropic's new paper on "Long-Running Agents" and the solution is clear:
It's not just about smarter models (better interns).
It's about better Context (external memory).
You need a "Manager" agent to leave a detailed "To-Do" list for the "Worker" agent. 2/

10.12.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

If you've seen Severance, you know the horror of the "Innie"β€”waking up at work with no memory of the past.
That's exactly how we treat AI Agents.
We spin them up, they work, we kill them.
The next agent starts with zero memory of what the previous one did.
It's the Amnesiac Intern problem. 🧡 1/

10.12.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Now security departments are going to have to figure out how to control AI agents in the hands of every knowledge worker?

Tell me what you think...
(3/3)

04.12.2025 22:26 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

I mean, do we want our knowledge workers using AI to create and deploy AI agents? Companies expend a lot of effort to keep these knowledge workers from clicking on phishing emails or sharing sensitive information when they set up their out of office notifications. (2/3)

04.12.2025 22:26 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Google Workspace Updates: Now available: Create AI agents to automate work with Google Workspace Studio

Google has announced Google Workspace Studio to allow enterprise Google users to create and share AI agents.

Google is continuing to pull ahead in AI, but is this really a good thing? (1/3)

workspaceupdates.googleblog.com/2025/12/work...

04.12.2025 22:26 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Watching a really interesting presentation by Dr Chase Cunningham at the Cloud Security Alliance Zero Trust Summit. He’s making a strong case for Cybersecurity Tax Credits as a means to incentivize better practices, increased investment, and risk reduction. #cybersecurity

03.12.2025 16:34 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Big news in the Identity & Access Management (IAM) market:

ServiceNow (NYSE: NOW) is acquiring Veza, giving them a solid entry into the Identity Governance & Administration space, and validating the importance of this capability in today's security and tech stack.

#cybersecurity #servicenow #IAM

02.12.2025 20:47 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
The AI Paradox: Why Hyper-Efficiency Could Mean More Human Work How a 19th-century economic theory can inform our thinking about AI and the future of work.

My latest on Substack:
open.substack.com/pub/northwoo...

#AI #FutureOfWork #JevonsParadox #ArtificialIntelligence #Leadership #TechTrends #Innovation #Economics #CloudComputing

02.12.2025 20:15 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Hackers Leverage Evilginx to Undermine MFA Security Mimicking Legitimate SSO Sites

Hackers Leverage Evilginx to Undermine MFA Security Mimicking Legitimate SSO Sites

02.12.2025 19:44 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
ChatGPT is down worldwide, conversations dissapeared for users OpenAI's AI-powered ChatGPT is down worldwide, and the reason is unclear.

ChatGPT is down worldwide, conversations dissapeared for users

02.12.2025 20:04 β€” πŸ‘ 6    πŸ” 2    πŸ’¬ 0    πŸ“Œ 1
Preview
Chinese Maker Behind Most of World’s Bitcoin Miners Has Been Focus of US National Security Probe Investigators have sought to assess whether Bitmain Technologies’ products pose risks of espionage or sabotage, according to people familiar with the matter. The company says they don’t.

I honestly had no idea that there was a virtual monopoly on Bitcoin mining hardware.

via @bloomberg.com

21.11.2025 16:59 β€” πŸ‘ 4    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0
Preview
#anthropic #incidentresponse #aistrategy #securityops #ciso | Michael Mosher I've spent the last week thinking about what the Anthropic AI Agent-based cyberattack should actually change in our security programs. Not the theoretical implications, but the specific moves we need ...

Security recommendations:
www.linkedin.com/posts/michae...

21.11.2025 18:08 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
#securitystrategy #aisafety #geopolitics #threatintel | Michael Mosher Thanks to LinkedIn's character limit on posts, I've had to stretch out my thoughts on the AI Agent cyberattack. But this has also given me time to reflect more on its implications... Once the initia...

Broad implications of attack:
www.linkedin.com/posts/michae...

21.11.2025 18:08 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
#cybersecurity #threatintel #aitrust #blueteam | Michael Mosher My next installment on the AI Agent cyberattack: Here's the uncomfortable truth about the Anthropic disclosure: we may never get independent verification. The controversy isn't really about whether ...

A look at the reliability of the attack information:
www.linkedin.com/posts/michae...

21.11.2025 18:08 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
How GTG-1002 used Claude AI for cyber attack | Michael Mosher posted on the topic | LinkedIn I promised I had more to say on the AI Agent cyber attack. Here's some more analysis on how it played out: What did the GTG-1002 playbook actually look like? Once Anthropic pieced together the tele...

Attack playbook analysis:
www.linkedin.com/posts/michae...

21.11.2025 18:08 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Anthropic's Claude used in Chinese espionage campaign | Michael Mosher posted on the topic | LinkedIn The first clue was speed. Claude Code sessions that looked like routine enterprise testing lit up Anthropic's telemetry in mid-September with thousands of requests per second β€” far beyond what any hu...

If you would like to jump to one of the posts from here, links below...

What happened:
www.linkedin.com/posts/michae...

21.11.2025 18:08 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

Over the past week, I've been posting on LinkedIn about the AI Agent-based cyberattack reported by Anthropic. I've looked at a number of aspects of the attack. The links to all of the posts are summarized here: www.linkedin.com/posts/michae...

#cybersecurity #ai-attack #anthropic #cyberattack

21.11.2025 18:08 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Let’s run the government like a business, drive the car like a bicycle, and play the guitar like a piano

25.11.2024 11:41 β€” πŸ‘ 32632    πŸ” 3788    πŸ’¬ 829    πŸ“Œ 218
Preview
Fancy Bear 'Nearest Neighbor' Attack Uses Nearby Wi-Fi Network

Fancy Bear 'Nearest Neighbor' Attack Uses Nearby Wi-Fi Network

25.11.2024 18:38 β€” πŸ‘ 3    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
Rising Tides: Wendy Nather on Resilience, Leadership, and Building a Stronger Cybersecurity Community Wendy Nather discusses the importance of amplifying others’ efforts for the common good–and how kindness aids survival.

Rising Tides: Wendy Nather on Resilience, Leadership, and Building a Stronger Cybersecurity Community

24.11.2024 15:12 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

πŸ‘

24.11.2024 05:03 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

After being on Twitter since 2008, it seems like time to set up a new shop.

23.11.2024 21:22 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

is there a link to this?

23.11.2024 21:05 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Innovative and frightening at the same time.

We have assumed too long that WiFi attacks would really only be practical through physical proximity.

23.11.2024 21:04 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

@mjmosher is following 19 prominent accounts