PinnedThe OWASP Large Language Model Applications Top 10: A Deep DiveLLM Security: A deep dive into the OWASP Large Language Model Top 10Nov 11, 2023Nov 11, 2023
PinnedDeception for Detection - Catching the Intruder’s Hand in the HoneyPotThe Apiary Framework aims to provide a structured approach to the deployment and management of honeypots on a network.Aug 11, 2022Aug 11, 2022
The Internet of Agents: What you need to know about collaborative AI Agents and the security risksResearchers from Tsinghua University, Peking University, Beijing University of Posts and Telecommunications, and Tencent have created a new…Jul 17Jul 17
Safeguarding Sensitive Data: Why Data Classification is Essential for Enterprise AI ModelsAs businesses increasingly adopt Large Language Models (LLMs) like Chat GPT-4, these AI systems are becoming integral to operations, from…Jul 7Jul 7
Backup and Recovery Solutions: An underrated attack surfaceLearn why threat actors target Backup and Recovery Solutions and how to secure them from attacks.Apr 30Apr 30
Why is my Outlook account named “ADMIN SERVICE”?A story of a threat actor group from Nigeria and the compromise of an Outlook accountApr 24, 2021Apr 24, 2021