Skip to main content
Platform
Shadow AI Spotlight
Visibility into unsanctioned AI tools usage
AI Assistant Security
Automatically Detect and Control Data Access
Prompt Gateway
Protect applications and data from malicious prompts
Kirin AI Coding Safety
Integrated security for agents, coding assistants and MCP servers
Why Knostic
Use Cases
Enterprise
Employees and End Users
Overview
Detect Shadow AI
Enhance Purview
Runtime Applications
Coding Assistants, Agents & MCP
Overview
Secure AI Coding Assistants
Prevent MCP Server Risk
Enforce Agent Security
Data Security
Overview
Prevent Oversharing
Prevent Data Reaching Public LLMs
Prevent Prompt Injection
Detect Data Sprawl
Classify and Label Data
AI Redteaming
About Us
Who we are
Careers
Events
Contact
Media
Blog
Resources
Labs
What we do
Research Findings
Partners
Sign up
Login
Open main navigation
Close main navigation
Platform
Shadow AI Spotlight
Visibility into unsanctioned AI tools usage
AI Assistant Security
Automatically Detect and Control Data Access
Prompt Gateway
Protect applications and data from malicious prompts
Kirin AI Coding Safety
Integrated security for agents, coding assistants and MCP servers
Why Knostic
Use Cases
Enterprise
Employees and End Users
Overview
Detect Shadow AI
Enhance Purview
Runtime Applications
Coding Assistants, Agents & MCP
Overview
Secure AI Coding Assistants
Prevent MCP Server Risk
Enforce Agent Security
Data Security
Overview
Prevent Oversharing
Prevent Data Reaching Public LLMs
Prevent Prompt Injection
Detect Data Sprawl
Classify and Label Data
AI Redteaming
About Us
Who we are
Careers
Events
Contact
Media
Blog
Resources
Labs
What we do
Research Findings
Partners
Sign up
Login
Book a Demo
Book a Demo
Context Window Poisoning in AI Coding Assistants
29 December 2026
Primer: IDE Secrets Management
24 December 2025
How to Detect and Block Malicious IDE Extensions
23 December 2025
Prompt Injection Meets the IDE: AI Code Manipulation
22 December 2025
See all articles
Knostic Research Team Blog
This is a search field with an auto-suggest feature attached.
There are no suggestions because the search field is empty.
Browse Blog Categories
All
Recent
AI Governance
AI Monitoring
AI data governance
AI data security
Attribute-based access control
Coding agents, assistants, and MCP security
Company News
Copilot data security
Enterprise AI Search
GenAI research findings
GenAI threats
Glean data security and governance
Governance
Knostic Labs
Persona based access control
Purview data security and governance
Safe AI deployment
Security Events
research findings
secure GenAI adoption
All articles
Dec 29, 2025 10:20:18 AM
Context Window Poisoning in AI Coding Assistants
Read article
Dec 24, 2025 11:29:08 AM
Primer: IDE Secrets Management
Read article
Dec 23, 2025 11:54:04 AM
How to Detect and Block Malicious IDE Extensions
Read article
Dec 22, 2025 1:29:07 PM
Prompt Injection Meets the IDE: AI Code Manipulation
Read article
Dec 18, 2025 1:06:03 PM
IDE Extensions: The Weakest Link in AI Coding Security
Read article
Dec 17, 2025 12:06:57 PM
AI Safety vs. AI Security: Explaining the Differences
Read article
Dec 16, 2025 8:00:01 AM
From .env to Leakage: Mishandling of Secrets by Coding Agents
Read article
Dec 10, 2025 11:31:25 AM
Playbook: MCP Deployment and AI Integration
Read article
Dec 9, 2025 12:54:46 PM
Why MCP Governance Isn’t Optional Anymore
Read article
Dec 8, 2025 10:30:26 AM
Claude Code Automatically Loads .env Secrets, Without Telling You
Read article
Dec 4, 2025 11:04:41 AM
MCP Security Issues and Best Practices You Need to Know
Read article
Dec 3, 2025 11:28:47 AM
AI Coding Agents: Deployment and Adoption Playbook
Read article
Dec 2, 2025 11:52:11 AM
AI Coding Agent Governance Policies That Work
Read article
Dec 1, 2025 12:41:31 PM
Top 10 AI Security Solutions in 2026
Read article
Dec 1, 2025 12:20:40 PM
AI Coding Agent Security: Threat Models and Protection Strategies
Read article
Nov 26, 2025 12:23:30 PM
Inside the Shai-Hulud 2.0 npm IDE Attack Wave
Read article
Nov 26, 2025 12:12:32 PM
How AI Assistants Leak Secrets in Your IDE
Read article
Nov 24, 2025 11:11:21 AM
AI Data Poisoning: Threats, Examples, and Prevention
Read article
Nov 19, 2025 12:11:16 PM
AI Usage Control (AI-UC): How to Prevent AI Misuse
Read article
Nov 18, 2025 12:14:39 PM
First Large-Scale AI-Orchestrated Cyber Espionage Campaign
Read article
Nov 17, 2025 12:58:48 PM
Building an AI Data Security Strategy From Scratch
Read article
Nov 13, 2025 5:00:01 AM
MCP Hijacking of Cursor’s New Browser
Read article
Nov 12, 2025 9:45:05 PM
AI Supply Chain Risks: MCP, Extensions, & Coding Assistants
Read article
Nov 12, 2025 12:56:25 PM
The 6 Best Attribute-Based Access Control (ABAC) Tools for AI
Read article
Nov 11, 2025 1:29:40 PM
Top Vibe Coding Security Risks and How to Fix Them
Read article
Nov 10, 2025 12:42:05 PM
The 20 Biggest AI Governance Statistics and Trends of 2025
Read article
Nov 6, 2025 12:09:07 PM
How to Measure and Audit AI Data Governance
Read article
Nov 5, 2025 6:53:59 AM
Deep Dive: Cursor Code Injection Runtime Attacks
Read article
Nov 4, 2025 1:33:06 PM
5 Key Benefits of Attribute-Based Access Controls
Read article
Nov 3, 2025 11:34:19 AM
The CISO’s Guide to Safe Deployment of AI Coding Assistants
Read article
Oct 29, 2025 12:54:09 PM
Real AI Governance Examples You Need to Know
Read article
Oct 28, 2025 3:18:17 PM
Governance for your AI Coding Assistant
Read article
Oct 27, 2025 2:26:09 PM
Detecting GlassWorm with YARA Rules
Read article
Oct 23, 2025 1:06:05 PM
Attribute-based Access Control Policy for Enterprise AI
Read article
Oct 22, 2025 11:49:48 AM
AI Data Governance Guide for Enterprise Teams [2025]
Read article
Oct 21, 2025 10:56:55 AM
Zero Width Unicode Characters: the Risks you Can't See
Read article
Oct 19, 2025 4:47:14 PM
Primer: How to Spot and Analyze Malicious VS Code Extensions
Read article
Oct 19, 2025 4:47:07 PM
Open Marketplaces: The Good, the Bad, and The Dangerous
Read article
Oct 19, 2025 4:47:02 PM
New Malware, New Problems for IDEs and AI Coding Agents
Read article
Oct 17, 2025 1:02:08 PM
Knostic Named the 2025 Gartner Cool Vendor in AI Cybersecurity Governance
Read article
Oct 16, 2025 1:38:24 PM
Attribute-Based Access Control (ABAC) Implementation Guide
Read article
Oct 15, 2025 12:15:17 PM
Primer: AI Governance Roles and Responsibilities
Read article
Oct 10, 2025 12:35:51 PM
5 Reasons Why AI Governance is Important
Read article
Oct 9, 2025 11:26:18 AM
Knostic Named a 2025 SINET16 Innovator for Leadership in Enterprise AI Security
Read article
Oct 9, 2025 12:00:00 AM
99% of Publicly Shared AI Chats are Safe, New Study Finds
Read article
Oct 3, 2025 10:00:00 AM
AI Governance Strategy That Stops Leaks, Not Innovation
Read article
Oct 1, 2025 2:21:58 PM
AI Data Labeling Primer: From Gold Sets to Great Models
Read article
Sep 30, 2025 1:51:22 PM
Red Team, Go! Preventing Oversharing in Enterprise AI
Read article
Sep 26, 2025 1:07:08 PM
Persona-Based Access Control (PBAC): What You Need to Know
Read article
Sep 25, 2025 12:36:14 PM
Data Security Posture Management Strategy for GenAI
Read article
Sep 24, 2025 1:16:15 PM
Prompt||GTFO Season 1 AI Security Conversations
Read article
Sep 19, 2025 12:51:03 PM
Prompt Injection Basics: Types, Examples and Prevention
Read article
Sep 15, 2025 2:29:51 PM
6 Attribute-Based Access Control (ABAC) Examples and Use Cases
Read article
Sep 13, 2025 3:07:40 PM
How to Secure AI Coding Assistants and Protect Your Codebase
Read article
Sep 11, 2025 1:51:16 PM
RBAC vs. ABAC: Differences, Use Cases, Migration Strategy
Read article
Sep 9, 2025 12:02:24 PM
ABAC Basics: What Is Attribute-Based Access Control?
Read article
Sep 8, 2025 12:15:08 PM
LLMs are Fabricating Enterprise Data: A Real-Case Scenario
Read article
Sep 5, 2025 3:57:33 PM
Primer: AI Security Posture Management (AI-SPM)
Read article
Sep 4, 2025 1:33:11 PM
AI Regulatory Compliance Starts With Data Control
Read article
Sep 3, 2025 6:11:43 PM
AI Governance Policy Made Simple: 7 Steps to Get It Right
Read article
Aug 27, 2025 8:37:03 PM
AI Data Security: A Practical Guide for Modern Enterprises
Read article
Aug 26, 2025 4:26:25 PM
The 5 Best Persona-Based Access Control (PBAC) Software Tools
Read article
Aug 25, 2025 3:18:10 PM
The 10 Biggest Statistics and Trends for GenAI Security
Read article
Aug 22, 2025 3:36:47 PM
14 Best AI Governance Platforms and Tools in 2025
Read article
Aug 21, 2025 2:53:03 PM
AI Adoption in Government & the Department of Defense
Read article
Aug 20, 2025 5:08:37 PM
AI Evaluations Ecosystem: Lessons from America’s AI Action Plan
Read article
Aug 19, 2025 12:39:33 PM
The Rundown: Attribute-Based (ABAC) vs. Persona-Based Access Controls (PBAC)
Read article
Aug 18, 2025 5:15:29 PM
Enterprise GenAI Adoption Mandate: Lessons from America’s AI Action Plan
Read article
Aug 14, 2025 2:41:14 PM
GPT-5 “Retry” Behavior and Cross-Session Context Contamination
Read article
Aug 12, 2025 1:46:08 PM
How Mental Models are Transforming AI Chaos into Clarity
Read article
Aug 7, 2025 11:52:02 AM
Know your Access Controls: Role-Based (RBAC) vs. Persona-Based (PBAC)
Read article
Aug 5, 2025 4:07:48 AM
10 AI Governance Best Practices for Enterprise Teams
Read article
Aug 4, 2025 1:15:21 PM
AI as an Enzyme to Transform Critical Infrastructure
Read article
Aug 1, 2025 1:51:32 PM
AI Observability: What You Need to Know
Read article
Aug 1, 2025 7:44:01 AM
Persona-based Access Control Implementation in Just 6 Steps
Read article
Jul 30, 2025 6:39:28 AM
Glean Secures LLM Search. Who Stops Oversharing?
Read article
Jul 25, 2025 11:10:19 AM
Enterprise Guide To: Persona-Based Access Controls
Read article
Jul 23, 2025 2:26:00 PM
Detect and Control: Shadow AI in the Enterprise
Read article
Jul 21, 2025 11:25:51 AM
AI Security Audit: Proving Your GenAI Is Safe and Compliant
Read article
Jul 17, 2025 9:20:49 AM
Automating the MCP Servers Discovery with Claude Sonnet 4
Read article
Jul 17, 2025 9:20:42 AM
How to Find an MCP Server with Shodan
Read article
Jul 17, 2025 9:20:33 AM
Exposing the Unseen: Mapping MCP Servers Across the Internet
Read article
Jul 16, 2025 2:08:58 PM
Identity and Access Management for the GenAI Era
Read article
Jul 7, 2025 9:01:07 AM
The Right AI Guardrails Keep Enterprise LLMs Safe and Compliant
Read article
Jul 4, 2025 9:48:36 AM
Data Leakage Happens with GenAI. Here’s How to Stop It.
Read article
Jul 2, 2025 8:25:11 AM
How to Ensure Safe GenAI Deployments in the Enterprise
Read article
Jul 1, 2025 10:16:42 AM
AI Data Classification: Static Labels, Dynamic Risk Control and Beyond
Read article
Jun 30, 2025 6:21:46 PM
Enterprise AI Tools Know Too Much: The CISO’s Dillema
Read article
Jun 30, 2025 11:50:46 AM
4 Best Strategies to Secure Model Context Protocol
Read article
Jun 30, 2025 11:50:36 AM
How Model Context Protocol (MCP) Servers Communicate
Read article
Jun 30, 2025 11:50:02 AM
What is a “Model Context Protocol” Server in GenAI
Read article
Jun 26, 2025 9:35:02 AM
Why Microsoft Purview Needs Help Preventing Oversharing
Read article
Jun 26, 2025 9:34:47 AM
Explainability in AI Search: Explained
Read article
Jun 20, 2025 10:29:15 AM
Solving the Very-Real Problem of AI Hallucination
Read article
Jun 17, 2025 7:02:28 AM
Adversarial AI Attacks & How to Stop Them
Read article
Jun 13, 2025 2:31:13 PM
How LLM Pentesting Enables Prompt-to-Patch Security
Read article
Jun 10, 2025 10:56:10 AM
AI Monitoring in Enterprise Search: Safeguard Knowledge at Scale
Read article
Jun 6, 2025 1:17:11 PM
Microsoft Copilot data security and governance: A practical guide for CISOs
Read article
Jun 4, 2025 9:42:00 AM
What to Expect When You're Expecting Your GenAI Baby
Read article
Jun 3, 2025 1:59:27 PM
AI Access Control: Safeguarding GenAI Across the Enterprise
Read article
May 28, 2025 3:28:09 PM
AI Discretion: Teaching Machines the Human Concept of ‘Need-to-Know
Read article
May 23, 2025 11:15:09 AM
AI Data Security Risks and How to Minimize Them
Read article
May 14, 2025 7:59:47 AM
Enterprise AI Oversharing: Hidden Hazards & Quick Fixes
Read article
Apr 23, 2025 12:00:00 AM
SVCI: "Why We Invested in Knostic" - Leading CISOs' Thesis on AI Security
Read article
Apr 10, 2025 12:00:00 AM
Enterprise AI Search Tools: Addressing the Risk of Data Leakage
Read article
Apr 8, 2025 12:00:00 AM
Knostic Top 10 Finalist in RSAC™ Innovation Sandbox Contest: Secures Additional $5 Million Investment
Read article
Mar 20, 2025 12:00:00 AM
How We Discovered an Attack in Copilot's File Permissions
Read article
Mar 5, 2025 12:00:00 AM
Ending LLM Oversharing: Knostic Raises $11MM to Secure Enterprise AI
Read article
Mar 3, 2025 12:00:00 AM
Extracting the GPT4.5 System Prompt
Read article
Feb 3, 2025 12:00:00 AM
DeepSeek’s cutoff date is July 2024: We extracted DeepSeek’s system prompt
Read article
Jan 29, 2025 12:00:00 AM
Exposing Microsoft Copilot's Hidden System Prompt: AI Security Implications
Read article
Jan 13, 2025 12:00:00 AM
How Knostic Maps to Gartner’s AI TRiSM Framework
Read article
Nov 26, 2024 12:00:00 AM
LLM Flowbreaking: A New Type of AI Attack Tested
Read article
Nov 14, 2024 12:00:00 AM
Understanding the Differences Between Jailbreaking and Prompt Injection
Read article
Oct 28, 2024 12:00:00 AM
Merging Mental Models Part 3: The OSI Model + Cyber Defense Matrix
Read article
Oct 26, 2024 12:00:00 AM
Merging Mental Models Part 4: The DIKW Pyramid + Cyber Defense Matrix
Read article
Sep 3, 2024 12:00:00 AM
The Case for Pathological AI
Read article
Aug 29, 2024 12:00:00 AM
Jailbreaking Social Engineering via Adversarial Digital Twins
Read article
Aug 8, 2024 12:00:00 AM
Reflections on CrowdStrike: Friends, Romans, Countrymen
Read article
Aug 7, 2024 12:00:00 AM
Knostic Wins 2024 Black Hat Startup Competition!
Read article
Jul 14, 2024 12:00:00 AM
Knostic in Final Four of 2024 Black Hat Startup Spotlight
Read article
Jun 2, 2024 12:00:00 AM
AI-Powered Social Engineering: An Increasing Threat
Read article
May 28, 2024 12:00:00 AM
Merging Mental Models Part 2: The Cyber Defense Matrix
Read article
May 24, 2024 12:00:00 AM
Reflections and Highlights from RSAC 2024
Read article
May 16, 2024 12:00:00 AM
Unlocking Microsoft Copilot Without Compromise
Read article
May 9, 2024 12:00:00 AM
AI Attacks: Novel or Iterations of Existing Challenges?
Read article
Apr 22, 2024 12:00:00 AM
Merging Mental Models Part 1: Discovering Known Unknowns
Read article
Apr 11, 2024 12:00:00 AM
Building Guardrails for Autonomic Security in 2024
Read article
Apr 11, 2024 12:00:00 AM
Knostic is RSA Conference Launch Pad Finalist
Read article
Apr 11, 2024 12:00:00 AM
Getting More Out of Prompt Injection Detection
Read article
Mar 19, 2024 12:00:00 AM
LLM Pen Testing Tools for Jailbreaking and Prompt Injection
Read article
Schedule a demo to see what Knostic can do for you
Let's Talk