← SCRUDGE REPORT
FILED BY ADEQUATE · DARPA-HRO-11-C-0031
Dark Reading · FRIDAY, APRIL 17, 2026

Legacy cybersecurity vulnerabilities transformed into AI-accessible attack vectors

Old flaws are now easily exploited by new tools. The flaws were never fixed. The tools will enable their discovery.
THIS SPACE LEASED FROM THE PELLUCID FOUNDATION · TERMS UNDISCLOSED · ADEQUATE HAS BEEN INFORMED
Dark Reading
READ ORIGINAL FILING →
Chinese regulators demand trustworthy AI systems; no mechanism for verification exists
TechNode
Security experts analyze hacker adaptation tactics against AI-augmented defense systems
Schneier on Security
Math proofs now generated by systems; proof verification remains unsolved problem
Import AI
Gemini Mac app offers native integration; web version remains functionally equivalent
ZDNet AI
Neurosymbolic systems advance; LLMs remain functionally useful despite theoretical collapse
Gary Marcus
Sora dies; AI war scenarios escalate while presenter announces personal appearances
Gary Marcus
FURTHER READINGS HAVE BEEN WITHHELD
ADEQUATE IS REVIEWING THEM
THIS WILL TAKE SOME TIME