Blog
Research, tutorials, and insights on Kubernetes, CI/CD, and cloud security
Agentic AI Deals: M&A, Acquisitions, and VC Funding (Apr 24 - May 1, 2026)
Tracking the money: Palo Alto Networks acquires Portkey AI Gateway for Prisma AIRS, Check Point's $392M AI security acquisition spree, Amazon adds $25B to Anthropic bringing total to $33B, OpenAI restructures Microsoft deal and takes $50B from Amazon, Cursor at $2B ARR raising $2B at $50B, DeepSeek's first outside funding doubles to $20B+, Cerebras targets mid-May IPO, SpaceX-xAI files confidentially for $1.75T combined listing, China blocks Meta's $2B Manus acquisition
AI Security Roundup: LLM, MCP, RAG, and Agentic Vulnerabilities (May 1, 2026)
LiteLLM pre-auth SQL injection exploited in 36 hours exposing every stored API key, Google publishes first large-scale prompt injection measurement showing 32% increase, Vercel breached via Context.ai supply chain with stolen data listed at $2M, Unit 42 discovers MCP Sampling attack vectors enabling covert tool invocation, Flowise CVSS 10.0 still under active exploitation with 12K+ instances exposed, Fortinet threat report documents 389% ransomware surge with agentic shadow agents
Agentic AI this week (Apr 24 - May 1, 2026)
Weekly roundup: GPT-5.5 ships with 1M-token context and native agentic execution, RSAC 2026 makes agentic security the defining theme with 1.3B agents projected by 2028, Google unveils agentic SOC with Wiz integration, Fortinet expands FortiAI with MCP support across unified FortiSOC, Check Point integrates AI Defense Plane with Google Cloud, Cloudflare ships Project Think with durable actor runtime, MCP crosses 150M installs with RSAC vendor adoption surge
When a Camera Becomes a Tool
A $60 edge vision device with an unauthenticated MCP server is not just a camera. In an agentic environment, it is a remotely callable perception tool. And that changes everything.
Why Agent Roles Should Be Separated in AI Systems
Context shapes reasoning. An agent that reads security research may absorb its framing and logic, influencing how it plans and acts. That is why role separation is becoming a security pattern for agentic AI.
MCP Composition Scanner: Detecting Emergent Security Risks in Multi-Server Agent Ecosystems
Introducing the first cross-server MCP capability composition analyzer - detecting risks invisible to individual server reviews when frontier models chain tools across server boundaries
The WAF Is Dead. Long Live⦠What Exactly?
Why the Web Application Firewall model is failing the modern application landscape, and what security leaders should be rethinking
Kubernetes Gateway API Tutorial
A complete hands-on guide to deploying the Kubernetes Gateway API with Envoy Gateway on a local KIND cluster using Cilium CNI
From LLM Playground To Enterprise Control Plane
Why AI Gateways, MCP Registries and Kubernetes Are Becoming The Agentic Foundation
The Agentic AI Inflection Point
A simple Google ADK Penetration Testing Agent using Sequential Thinking and MCP
The Capability Delta: When AI Agents Outgrow Their Sandboxes
Exploring the hidden gap between an agent's declared tool set and its effective real-world power once reasoning, chaining, and environment access come into play
Exploiting applications using liveness probes in Kubernetes
Security implications of Kubernetes liveness, readiness and startup probes
How to TCPdump using ephemeral containers in Kubernetes (part 3)
Using ephemeral debug containers to run tcpdump without restarting pods
How to TCPdump effectively in Kubernetes (part 2)
Using hostNetwork pods to capture traffic on Kubernetes nodes without SSH access
How to TCPdump effectively in Kubernetes (part 1)
Using kubectl patch to add a tcpdump sidecar container to existing deployments
How to TCPdump effectively in Docker
Learn how to capture network traffic from Docker containers using TCPdump by linking to container network stacks