RSA
Attending RSA? Book a meeting with our team to discuss your Offensive Security needs.
RSA
Attending RSA? Book a meeting with our team to discuss your Offensive Security needs.

AI Pentesting

Why Security Must Be at the Core of AI Development

The rapid rise of artificial intelligence has brought groundbreaking advancements—but also significant security...
Mar 10, 2025
Est Read Time: 4 min

How to Prevent Indirect Prompt Injection Attacks

Direct and indirect prompt injection attacks currently rank as the top threat to large language models recognized by...
Feb 25, 2025
Est Read Time: 4 min

LLM System Prompt Leakage: Prevention Strategies

LLM system prompt leakage represents an important addition to the Open Worldwide Application Security Project (OWASP)...
Feb 3, 2025
Est Read Time: 5 min

Vector and Embedding Weaknesses: Vulnerabilities and Mitigations

This year's Open Web Application Security Project (OWASP) Top 10 for LLM Applications debuts a new leading...
Dec 30, 2024
Est Read Time: 4 min

Ensuring safe and equitable advancements in AI

When we think about technological advancements, it’s easy to focus on the "wow" factor. Cutting-edge tools, sleek...
Nov 29, 2024
Est Read Time: 2 min

Top 40 AI Cybersecurity Statistics

The latest AI cybersecurity statistics show an increase in artificial intelligence to power phishing, ransomware...
Oct 10, 2024
Est Read Time: 8 min

LLM Overreliance: What It Is and How to Prevent

Even back in Episode V, C3PO expected R2D2 to know better than to trust a strange computer, but nearly half a century...
Oct 3, 2024
Est Read Time: 5 min

Insecure Plugin Design in LLMs: Prevention Strategies

Insecure plugin design in language learning models enables attackers to automatically launch malicious requests. This...
Sep 26, 2024
Est Read Time: 5 min

Using AI for Offensive Security: Executive Report Summary

The Cloud Security Alliance (CSA) has released an important new report on Using AI for Offensive Security. The report...
Sep 19, 2024
Est Read Time: 6 min
    1 2 3