Post-Quantum Migration Has a Deadline: What Qrisp 0.8 Changes

Gate-level quantum circuit diagram illustrating the post-quantum cryptography migration deadline established by Shor's algorithm compilation

5 min readThe post-quantum migration deadline is now quantifiable. Security teams have known for years that Shor’s algorithm threatens RSA. What they have lacked is a precise engineering target — the specific gate counts, qubit overhead, and compilation benchmarks that convert a theoretical timeline into a project plan. On 5 April 2026, IQM Quantum Computers and Fraunhofer …

Read more

Anthropic’s Mythos Model Finds Thousands of Zero-Days — Then Gets Locked Behind a 40-Org Consortium

Visualisation of AI-assisted vulnerability discovery across a software dependency graph — illustrating Anthropic Mythos cybersecurity research

5 min readAnthropic has previewed a frontier model that autonomously discovered thousands of previously unknown software vulnerabilities across every major operating system and browser — and then decided not to release it. Anthropic Mythos, which scored 83.1% on cybersecurity benchmarks in internal red-team testing, will instead be deployed exclusively through Project Glasswing, a restricted consortium of 40+ …

Read more

Agentic AI’s Attack Surface Is Already Exploited: What the 2025 Incident Record Tells Enterprise Security Teams

7 min readA documented sequence of confirmed attacks across 2025 — including zero-click data exfiltration via Microsoft 365 Copilot and malicious MCP servers distributed through npm — defines a new category of enterprise exposure. Here is what the incident record shows and what security teams must do now.