<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Security on Medium]]></title>
        <description><![CDATA[Latest stories tagged with Security on Medium]]></description>
        <link>https://medium.com/tag/security/latest?source=rss------security-5</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>Security on Medium</title>
            <link>https://medium.com/tag/security/latest?source=rss------security-5</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Wed, 06 May 2026 14:06:17 GMT</lastBuildDate>
        <atom:link href="https://medium.com/feed/tag/security" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Claude Code is introducing old bad practices in new ways.]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@rem5/claude-code-is-introducing-old-bad-practices-in-new-ways-fc7273ef8efd?source=rss------security-5"><img src="https://cdn-images-1.medium.com/max/960/1*ZVgC8MCx9sbRPd_noIfTBw.jpeg" width="960"></a></p><p class="medium-feed-snippet">Let&#x2019;s discuss.</p><p class="medium-feed-link"><a href="https://medium.com/@rem5/claude-code-is-introducing-old-bad-practices-in-new-ways-fc7273ef8efd?source=rss------security-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@rem5/claude-code-is-introducing-old-bad-practices-in-new-ways-fc7273ef8efd?source=rss------security-5</link>
            <guid isPermaLink="false">https://medium.com/p/fc7273ef8efd</guid>
            <category><![CDATA[ai]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[Rob Gil]]></dc:creator>
            <pubDate>Wed, 06 May 2026 14:06:08 GMT</pubDate>
            <atom:updated>2026-05-06T14:06:08.244Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[X-Raying EVM Proxies: How to Eradicate Deep-Nested Hacks in Web3 Agents]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://coinsbench.com/x-raying-evm-proxies-how-to-eradicate-deep-nested-hacks-in-web3-agents-0f71b9875bea?source=rss------security-5"><img src="https://cdn-images-1.medium.com/max/1024/1*sYI58Qa3wr5Aa_dxE_oDGg.jpeg" width="1024"></a></p><p class="medium-feed-snippet">Layers 1 and 2 of the Lirix architecture guarantee that an AI agent won&#x2019;t accidentally shoot itself in the foot due to a hallucinated&#x2026;</p><p class="medium-feed-link"><a href="https://coinsbench.com/x-raying-evm-proxies-how-to-eradicate-deep-nested-hacks-in-web3-agents-0f71b9875bea?source=rss------security-5">Continue reading on CoinsBench »</a></p></div>]]></description>
            <link>https://coinsbench.com/x-raying-evm-proxies-how-to-eradicate-deep-nested-hacks-in-web3-agents-0f71b9875bea?source=rss------security-5</link>
            <guid isPermaLink="false">https://medium.com/p/0f71b9875bea</guid>
            <category><![CDATA[ai-agent]]></category>
            <category><![CDATA[ethereum]]></category>
            <category><![CDATA[web3]]></category>
            <category><![CDATA[ai]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[lokii]]></dc:creator>
            <pubDate>Wed, 06 May 2026 14:04:16 GMT</pubDate>
            <atom:updated>2026-05-06T14:04:16.871Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Gas in NanoChain is not reactive, it is adaptive.]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://nanchnet.medium.com/gas-in-nanochain-is-not-reactive-it-is-adaptive-34c7f4aa4a27?source=rss------security-5"><img src="https://cdn-images-1.medium.com/max/1080/1*YmknCrzX9knyVoWjuD2lJw.png" width="1080"></a></p><p class="medium-feed-snippet">AdaptiveGas observes real network behavior over time, learning through a ring buffer while optionally validating signals via oracle input.</p><p class="medium-feed-link"><a href="https://nanchnet.medium.com/gas-in-nanochain-is-not-reactive-it-is-adaptive-34c7f4aa4a27?source=rss------security-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://nanchnet.medium.com/gas-in-nanochain-is-not-reactive-it-is-adaptive-34c7f4aa4a27?source=rss------security-5</link>
            <guid isPermaLink="false">https://medium.com/p/34c7f4aa4a27</guid>
            <category><![CDATA[security]]></category>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[nanch-protocol]]></category>
            <category><![CDATA[gas]]></category>
            <category><![CDATA[adaptive-learning]]></category>
            <dc:creator><![CDATA[NanoChain]]></dc:creator>
            <pubDate>Wed, 06 May 2026 13:58:46 GMT</pubDate>
            <atom:updated>2026-05-06T13:58:46.116Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[In NanoChain, external data is not trusted by default, it is verified.]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://nanchnet.medium.com/in-nanochain-external-data-is-not-trusted-by-default-it-is-verified-78bf6f1dccd2?source=rss------security-5"><img src="https://cdn-images-1.medium.com/max/1080/1*5CdPfBSJI8AKBPOON_6_7w.png" width="1080"></a></p><p class="medium-feed-snippet">AiOracle treats every signal as evidence. Multiple signed inputs are aggregated using methods like median or weighted mean, and only&#x2026;</p><p class="medium-feed-link"><a href="https://nanchnet.medium.com/in-nanochain-external-data-is-not-trusted-by-default-it-is-verified-78bf6f1dccd2?source=rss------security-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://nanchnet.medium.com/in-nanochain-external-data-is-not-trusted-by-default-it-is-verified-78bf6f1dccd2?source=rss------security-5</link>
            <guid isPermaLink="false">https://medium.com/p/78bf6f1dccd2</guid>
            <category><![CDATA[nanch]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[nanochain]]></category>
            <category><![CDATA[oracle]]></category>
            <category><![CDATA[ai]]></category>
            <dc:creator><![CDATA[NanoChain]]></dc:creator>
            <pubDate>Wed, 06 May 2026 13:58:27 GMT</pubDate>
            <atom:updated>2026-05-06T13:58:27.704Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[The Public Is the Last Line of Defense Against Digital Deception]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@legal_92819/the-public-is-the-last-line-of-defense-against-digital-deception-7acfe04280a4?source=rss------security-5"><img src="https://cdn-images-1.medium.com/max/1742/1*Up_-58ypb6E37zpJWYAHXg.jpeg" width="1742"></a></p><p class="medium-feed-snippet">We are entering an era where information itself has become a battlefield.</p><p class="medium-feed-link"><a href="https://medium.com/@legal_92819/the-public-is-the-last-line-of-defense-against-digital-deception-7acfe04280a4?source=rss------security-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@legal_92819/the-public-is-the-last-line-of-defense-against-digital-deception-7acfe04280a4?source=rss------security-5</link>
            <guid isPermaLink="false">https://medium.com/p/7acfe04280a4</guid>
            <category><![CDATA[generative-ai-tools]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[fake-news]]></category>
            <category><![CDATA[artificial-intelligence]]></category>
            <category><![CDATA[democracy]]></category>
            <dc:creator><![CDATA[FakeNewsFlag]]></dc:creator>
            <pubDate>Wed, 06 May 2026 13:19:06 GMT</pubDate>
            <atom:updated>2026-05-06T14:04:58.434Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Kubernetes Security Is Not Optional Anymore — Here’s What Actually Matters]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@jinalpatel11121999/kubernetes-security-is-not-optional-anymore-heres-what-actually-matters-96e70c393c42?source=rss------security-5"><img src="https://cdn-images-1.medium.com/max/1408/1*XKsH3amvRKvecpjluoqDwg.png" width="1408"></a></p><p class="medium-feed-snippet">Four years of production clusters taught me that most teams are one misconfigured pod away from a bad day.</p><p class="medium-feed-link"><a href="https://medium.com/@jinalpatel11121999/kubernetes-security-is-not-optional-anymore-heres-what-actually-matters-96e70c393c42?source=rss------security-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@jinalpatel11121999/kubernetes-security-is-not-optional-anymore-heres-what-actually-matters-96e70c393c42?source=rss------security-5</link>
            <guid isPermaLink="false">https://medium.com/p/96e70c393c42</guid>
            <category><![CDATA[security]]></category>
            <category><![CDATA[webhooks]]></category>
            <category><![CDATA[kubernetes]]></category>
            <category><![CDATA[devsecops]]></category>
            <category><![CDATA[devops]]></category>
            <dc:creator><![CDATA[Jinalpatel]]></dc:creator>
            <pubDate>Wed, 06 May 2026 13:01:03 GMT</pubDate>
            <atom:updated>2026-05-06T13:01:03.604Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Best IP Geolocation APIs in 2026: An Honest Comparison of 10 Providers]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@abdullah1009458/best-ip-geolocation-apis-in-2026-an-honest-comparison-of-10-providers-4e58df36595a?source=rss------security-5"><img src="https://cdn-images-1.medium.com/max/1096/1*2yRx5tTkikvLKqV3XFo_mA.png" width="1096"></a></p><p class="medium-feed-snippet">If you&#x2019;re evaluating IP geolocation APIs right now, the market has changed. Residential proxy detection, relay classification (iCloud&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@abdullah1009458/best-ip-geolocation-apis-in-2026-an-honest-comparison-of-10-providers-4e58df36595a?source=rss------security-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@abdullah1009458/best-ip-geolocation-apis-in-2026-an-honest-comparison-of-10-providers-4e58df36595a?source=rss------security-5</link>
            <guid isPermaLink="false">https://medium.com/p/4e58df36595a</guid>
            <category><![CDATA[ip-geolocation-api]]></category>
            <category><![CDATA[privacy]]></category>
            <category><![CDATA[residential-proxies]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[ABDULLAH AFZAL]]></dc:creator>
            <pubDate>Wed, 06 May 2026 12:59:35 GMT</pubDate>
            <atom:updated>2026-05-06T13:03:42.743Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Homelander Security Audit: Uniswap v4 — Summary and Outcomes]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@MEV-X/homelander-security-audit-uniswap-v4-summary-and-outcomes-9352b029dce5?source=rss------security-5"><img src="https://cdn-images-1.medium.com/max/1080/1*xlRpJjN99GhUXEjWc5Jj6g.png" width="1080"></a></p><p class="medium-feed-snippet">Homelander&#x2019;s Uniswap v4 plugin has completed an independent security audit conducted by MixBytes. This post covers what was reviewed, what&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@MEV-X/homelander-security-audit-uniswap-v4-summary-and-outcomes-9352b029dce5?source=rss------security-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@MEV-X/homelander-security-audit-uniswap-v4-summary-and-outcomes-9352b029dce5?source=rss------security-5</link>
            <guid isPermaLink="false">https://medium.com/p/9352b029dce5</guid>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[defi]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[ethereum]]></category>
            <category><![CDATA[smart-contracts]]></category>
            <dc:creator><![CDATA[MEV-X]]></dc:creator>
            <pubDate>Wed, 06 May 2026 12:55:22 GMT</pubDate>
            <atom:updated>2026-05-06T12:55:22.615Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Instagram’s E2EE Reversal Shows Where Privacy May Be Heading]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-snippet">Instagram is removing support for end-to-end encrypted direct messages after May 8, 2026. Instagram&#x2019;s own Help Center says end-to-end&#x2026;</p><p class="medium-feed-link"><a href="https://andyware.medium.com/instagrams-e2ee-reversal-shows-where-privacy-may-be-heading-f9cab99597ca?source=rss------security-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://andyware.medium.com/instagrams-e2ee-reversal-shows-where-privacy-may-be-heading-f9cab99597ca?source=rss------security-5</link>
            <guid isPermaLink="false">https://medium.com/p/f9cab99597ca</guid>
            <category><![CDATA[privacy]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[Andrew Dear]]></dc:creator>
            <pubDate>Wed, 06 May 2026 12:52:28 GMT</pubDate>
            <atom:updated>2026-05-06T12:52:28.513Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[AI turning Code Dependencies into Weapons]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/navigating-the-ai-revolution/ai-turning-code-dependencies-into-weapons-57332e84e93a?source=rss------security-5"><img src="https://cdn-images-1.medium.com/max/1536/1*1XpFmW0lIwHGDvRycEygng.png" width="1536"></a></p><p class="medium-feed-snippet">Imagine a world where you are a CEO. You are sipping your morning coffee. Your company runs like a well-oiled machine. Sales dashboards&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/navigating-the-ai-revolution/ai-turning-code-dependencies-into-weapons-57332e84e93a?source=rss------security-5">Continue reading on Navigating the AI Revolution »</a></p></div>]]></description>
            <link>https://medium.com/navigating-the-ai-revolution/ai-turning-code-dependencies-into-weapons-57332e84e93a?source=rss------security-5</link>
            <guid isPermaLink="false">https://medium.com/p/57332e84e93a</guid>
            <category><![CDATA[business-strategy]]></category>
            <category><![CDATA[business]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[ai]]></category>
            <category><![CDATA[artificial-intelligence]]></category>
            <dc:creator><![CDATA[Dr Tyrone Grandison]]></dc:creator>
            <pubDate>Wed, 06 May 2026 12:44:06 GMT</pubDate>
            <atom:updated>2026-05-06T12:44:06.156Z</atom:updated>
        </item>
    </channel>
</rss>