LLM vector and embedding risks and how to defend against them

LLM vector and embedding risks and how to defend against them

As large language model (LLM) applications mature, the line between model performance and model vulnerability continues to blur ...
The OWASP LLM Top 10 and Sonatype: Data and model poisoning

The OWASP LLM Top 10 and Sonatype: Data and model poisoning

Artificial intelligence (AI) continues to redefine what is possible in software, from predictive models to generative content. But as AI systems grow in power, so too do the threats targeting their foundations, ...
The OWASP LLM Top 10 and Sonatype: Supply chain security

The OWASP LLM Top 10 and Sonatype: Supply chain security

The rise of AI has unlocked unprecedented opportunities across industries, from automating tedious tasks to accelerating software development and transforming how applications are built and maintained. However, AI has also exposed critical ...
owasp top 10 application vulnerabilities

Understanding the OWASP Top 10 Application Vulnerabilities

The OWASP Top 10 provides a standardized catalog of the most critical security risks to web applications. Compiled by a global community of security experts, this influential document highlights the... The post ...

Understanding the OWASP API Security Top 10: Why BOLA is the Number One Risk for APIs

Understanding and addressing vulnerabilities is critical in cybersecurity, where APIs serve as the backbone for seamless data exchange. The OWASP API Security Top 10, revised in 2023, provides a comprehensive guide to ...