Spencer Thompson

5.1K posts

Spencer Thompson banner
Spencer Thompson

Spencer Thompson

@SThomps

I work @originhq and @preludeorg

Vancouver • NYC Katılım Ağustos 2008
610 Takip Edilen712 Takipçiler
adam bain
adam bain@adambain·
Has anyone seen a company that tells you which agents are running in the enterprise & shows you what they have access to + what they’ve done? I suspect it might be something that looks like: “agent observability + agent control plane + agent posture mgmt?” Does it exist?
Nicolas Krassas@Dinosn

Google's Cybersecurity 2026 Forecast Report warns of a "Shadow Agent" crisis. These AI agents, deployed by employees without corporate oversight, can create invisible pipelines for sensitive information, leading to data leaks, compliance violations, and IP theft. services.google.com/fh/files/misc/…

English
22
0
20
13.3K
Spencer Thompson retweetledi
Origin
Origin@originhq·
Introducing Praxis, an adversarial framework for discovering, controlling, and orchestrating computer-use agents running on endpoints. Announcement → originhq.com/blog/praxis-an… Get Praxis → praxis.originhq.com
English
3
19
62
13.3K
Spencer Thompson retweetledi
David Kaplan
David Kaplan@depletionmode·
Natural language collapses meaning across layers. LLMs don’t just fail at instructions, they misinterpret intent, and they expose that unforgivably when we treat language like a protocol. In a short @originhq blog post, I break down semantic protocol confusion and what it means for agent safety. originhq.com/blog/semantic-…
English
2
3
5
826
Spencer Thompson retweetledi
Origin
Origin@originhq·
In this simple example, we show that Claude Code can read the iMessage database on the latest version of macOS, even with a leading EDR running on the system, illustrating the impact of an adversary who can remotely control the agent. We do this using Terminator, an internal research tool we built while studying the security implications of computer use agents. In this setup, the terminal application has previously been granted FDA, a subtle misconfiguration that effectively gives the agent access to unexpected context.
English
5
29
152
17.9K
Spencer Thompson retweetledi
Origin
Origin@originhq·
We believe that: 1. The potential economic upsides of the productivity boosts that Computer Use Agents offer incentivize us to provide them with more access to our computers to increase the amount of context they can have. 2. They represent a new type of interpreter that dramatically closes the gap between intent and execution, is self-corrective, and yields nondeterministic outputs that create massive amounts of "noise" 3. Their ability to generate and execute new tools on the fly, combined with expanded access, challenges the very foundation of a signature-based model of detection As these systems become increasingly intertwined with how we use computers, we must consider what it means to detect their misuse through out-of-context interactions with the host. If you're interested in collaborating on tooling or joining our team, please contact research@preludesecurity.com
English
1
2
15
1.5K
Spencer Thompson retweetledi
Connor McGarr
Connor McGarr@33y0re·
Today I am happy to release a new blog post about Pointer Authentication (PAC) on Windows ARM64! This post takes a look at the Windows implementation of PAC in both user-mode and kernel-mode. I must say, I have REALLY been enjoying Windows on ARM!! preludesecurity.com/blog/windows-a…
English
8
65
214
18K
Spencer Thompson retweetledi
Origin
Origin@originhq·
This method demonstrates how hardware-level telemetry, coupled with contextual reasoning, can surface malicious activity that signature-based approaches will always miss as malware authors innovate in response. 📃Full write-up → preludesecurity.com/blog/unexpecte…
English
0
11
22
2.6K
Spencer Thompson
Spencer Thompson@SThomps·
Following up on our financing announcement from last week - we believe that the conditions are right for a 3rd generation of endpoint security, based on a new technology shift, new architectural requirements, new adversary behavior. In short, we think "it's time". Post below.
English
1
0
0
81
Spencer Thompson retweetledi
Matt Hand
Matt Hand@matterpreter·
There is a very limited pool of donors. The process for getting screened to see if you’re a match is a simple oral swab you can do at home. Please consider signing up at bethematch.org/become-a-donor/ There’s nothing more important to me than her. It would mean the world to my family.
English
2
31
35
12.7K
Spencer Thompson
Spencer Thompson@SThomps·
4/ It now takes no more than a handful of minutes for a definitive answer to the question "are we vulnerable to X threat?" - including remediations that are instantly applied and validated.
English
0
0
0
67
Spencer Thompson
Spencer Thompson@SThomps·
3/ We are introducing a series of capabilities designed to help organizations transform their existing threat intelligence into validated protections in minutes. An organization can upload any CTI and Prelude will automatically build the appropriate detections and tests.
English
1
0
0
76
Spencer Thompson
Spencer Thompson@SThomps·
1/ In conversations with customers and prospects over the past year, it's become increasingly obvious that the current detection & response process is too slow. We've seen research papers published showing that GPT4 can automatically exploit vulnerabilities just by "reading"...
Prelude@preludeorg

You just got 45 more pages of #threatintelligence. Enter Prelude's new set of autonomous capabilities—built to transform that CTI into validated protections...fast. See how we're leveraging AI to unify SecOps and streamline the threat management process: hubs.la/Q02vS-pF0

English
1
0
0
243