PinnedThe OWASP Large Language Model Applications Top 10: A Deep DiveLLM Security: A deep dive into the OWASP Large Language Model Top 10Nov 11, 2023Nov 11, 2023
PinnedDeception for Detection - Catching the Intruder’s Hand in the HoneyPotThe Apiary Framework aims to provide a structured approach to the deployment and management of honeypots on a network.Aug 11, 2022Aug 11, 2022
The Internet of Agents: What you need to know about collaborative AI Agents and the security risksResearchers from Tsinghua University, Peking University, Beijing University of Posts and Telecommunications, and Tencent have created a new…Jul 17, 2024Jul 17, 2024
Safeguarding Sensitive Data: Why Data Classification is Essential for Enterprise AI ModelsAs businesses increasingly adopt Large Language Models (LLMs) like Chat GPT-4, these AI systems are becoming integral to operations, from…Jul 7, 2024Jul 7, 2024
Backup and Recovery Solutions: An underrated attack surfaceLearn why threat actors target Backup and Recovery Solutions and how to secure them from attacks.Apr 30, 2024Apr 30, 2024
Why is my Outlook account named “ADMIN SERVICE”?A story of a threat actor group from Nigeria and the compromise of an Outlook accountApr 24, 2021Apr 24, 2021