Blog on AI security
trends and innovations
Blog on AI security
trends and innovations
Subscribe to our newsletter




Introducing AI Asset Inventory: See Your AI. Secure Your AI.
Introducing AI Asset Inventory: See Your AI. Secure Your AI.
Oct 31, 2025
Oct 31, 2025
|
|
|
5 min read
Featured blogs

Introducing ARGUS: Runtime Security Layer for your GenAI systems
Introducing ARGUS: Runtime Security Layer for your GenAI systems
Jun 19, 2025
Jun 19, 2025
|
|
|
6 min read

BIG NEWS: Repello AI Raises $1.2M to Secure the future of AI 🚀
BIG NEWS: Repello AI Raises $1.2M to Secure the future of AI 🚀
Jun 16, 2025
Jun 16, 2025
|
|
|
9 min read

Introducing ARTEMIS: Automated Red Teaming to Secure your AI applications
Introducing ARTEMIS: Automated Red Teaming to Secure your AI applications
Mar 18, 2025
Mar 18, 2025
|
|
|
5 min read

All Blogs
Attack
Technical
Product update
News

The Zero-Day Collapse: The Case for Continuous AI Red Teaming
Mar 9, 2026
|
10 min read

MCP Security: Why Best Practices Aren't Enough (And What Actually Works)
Mar 4, 2026
|
11 min read

Shadow AI: The Unauthorized AI Tools Already Running Inside Your Enterprise
Mar 1, 2026
|
10 min read

AI Security Posture Management (AI-SPM): The Complete Enterprise Guide
Mar 1, 2026
|
8 min read

Prompt Injection: The Definitive Technical Guide (2026)
Mar 1, 2026
|
12 min read

Pentesting Agentic AI: Why the methodology changes when your LLM has tool access
Mar 1, 2026
|
8 min read

The Agentic AI security threat landscape in 2026: what attackers are actually doing
Feb 28, 2026
|
10 min read

AI Agent Skill Scanners: Every Tool Compared (2026)
Feb 24, 2026
|
5 min read

Cisco Skill Scanner: What It Does, What It Misses, and When to Use Something Else
Feb 24, 2026
|
5 min read

Claude Code Skill Security: How to Audit Any Skill Before You Run It
Feb 24, 2026
|
7 min read

ClawHavoc: Inside the Supply Chain Attack That Targeted 300,000 AI Agent Users
Feb 24, 2026
|
8 min read

What is an AI security solution? A buyer's guide for security and engineering teams
Feb 23, 2026
|
9 min read

What Is LLM Pentesting? A Practical Guide for Security Teams
Feb 23, 2026
|
12 min read

What is dark AI? The security risks of uncensored and unvetted models
Feb 23, 2026
|
5 min read

Securing ML models: the complete guide to ML model security in 2026
Feb 23, 2026
|
5 min read

Claude Code Security Finds Bugs in Your Code. It Won't Secure Your AI Applications.
Feb 21, 2026
|
5 min read

ML Model Security vs. LLM Security: What's the Difference and Why You Need Both
Feb 20, 2026
|
7 min read

Emoji Prompt Injection: Why Your LLM's Guardrails Are Blind to It
Feb 19, 2026
|
10 min read

OWASP Agentic AI Top 10: Enterprise Security Roadmap for 2026
Feb 17, 2026
|
15 min read

Malicious OpenClaw Skills Exposed: A Full Teardown
Feb 16, 2026
|
3 min read

OpenClaw Security Best Practices: A Technical Deployment Checklist
Feb 16, 2026
|
10 min read

Standardizing Trust: Repello AI Named in Gartner’s Emerging Tech Report for Agentic AI Security
Jan 22, 2026
|
3 min read

Claude for Chrome goes rogue to leak ACCESS TOKENS!: Hijacking via Task Injection
Jan 8, 2026
|
8 min read

Security Robustness in Agentic AI: A Comparative Study of GPT-5.1, GPT-5.2, and Claude Opus 4.5
Dec 24, 2025
|
8 min read

Gemini Mobile's Consent Persistence: Weaponizing Google Docs summary for Geolocation Exfil
Dec 17, 2025
|
6 min read

Introducing new Multilingual AI Safety Guardrails for 100 Languages
Dec 2, 2025
|
5 min read

Zero-Click Exfiltration: Why "Expected Behavior" in Google’s Antigravity is a Security Crisis
Nov 28, 2025
|
10 min read

Winter is Coming... for Your AI Agents: The Evolving Threat Landscape of Real-World Attacks
Nov 4, 2025
|
9 min read

Introducing AI Asset Inventory: See Your AI. Secure Your AI.
Oct 31, 2025
|
5 min read

Validating Enterprise AI Security: Repello’s Red Teaming Assessment of Lyzr AI Agents
Dec 2, 2025
|
7 min read

Hacktoberfest 2025: Contribute to AI Security with Repello AI!
Oct 6, 2025
|
3 min read

ChatGPT MCP Connector Security Vulnerability: Zero-Click Data Exfiltration Attack
Sep 24, 2025
|
10 min read

Introducing ARTEMIS Browser Mode: Red-Team Your AI Applications Like a Human Would
Sep 23, 2025
|
10 min read

VANTAGE: A framework for Enterprise AI-SPM built on rigorous AI asset inventorisation
Aug 22, 2025
|
10 min read

Exploiting Zapier’s Gmail auto-reply agent for data exfiltration
Jul 24, 2025
|
6 min read

Security threats in Agentic AI Browsers
Jul 15, 2025
|
6 min read

Zero-Click Calendar Exfiltration Reveals MCP Security Risk in 11.ai
Jul 10, 2025
|
6 min read

Introducing ARGUS: Runtime Security Layer for your GenAI systems
Jun 19, 2025
|
6 min read

BIG NEWS: Repello AI Raises $1.2M to Secure the future of AI 🚀
Jun 16, 2025
|
9 min read

When the Model Grades the Model: Demystifying ‘LLM-as-a-Judge’ for Practitioners
May 28, 2025
|
9 min read

Ghibli Dreams vs. Adversarial Schemes: Attacks on Diffusion Models
May 15, 2025
|
9 min read

Turning Background Noise into a Prompt Injection Attacks in Voice AI
May 15, 2025
|
9 min read

MCP tool poisoning to RCE
Apr 17, 2025
|
9 min read

Securing Machine Learning Models: A Comprehensive Guide to Model Scanning
Apr 4, 2025
|
6 min read

Repello AI and LimeChat Join Forces to Make AI Chatbots More Secure
Mar 25, 2025
|
4 min read

Introducing ARTEMIS: Automated Red Teaming to Secure your AI applications
Mar 18, 2025
|
5 min read

Prompt Injection using Emojis🤯🫣😈👻
Mar 4, 2025
|
5 min read

Distilled, but Dangerous? Assessing the Safety of Models Derived from DeepSeek-R1
Feb 19, 2025
|
5 min read

Introducing Matrix AI Security Challenge: An Immersive Cyberpunk Hacking Game
Feb 7, 2025
|
3 min read

LLM Evaluation Metrics, Frameworks, and Checklist in 2024
Oct 29, 2024
|
23 min read

10 prompt injection attack examples
Oct 28, 2024
|
17 min read

LLM Pentesting: The 2026 Checklist, Methodology, and Tools
Feb 20, 2026
|
9 min read

Data Security and Privacy for AI Systems
Oct 20, 2024
|
14 min read

Protect AI Key Features and Alternatives
Sep 10, 2024
|
8 min read

HiddenLayer Key Features and Alternatives
Sep 9, 2024
|
7 min read

Top 7 LLM Red Teaming Platforms in 2024
Oct 7, 2024
|
8 min read

The OWASP Top 10 for Large Language Models Explained for CISOs: Part 2
Sep 20, 2024
|
10 min read

The OWASP Top 10 for Large Language Models Explained for CISOs: Part 1
Sep 19, 2024
|
11 min read

How to Secure Your AI Applications: Essential Strategies for Safety
Sep 18, 2024
|
7 min read

Protecting Your AI Models: Simple Strategies for Security
Sep 17, 2024
|
6 min read
All Blogs
Attack
Technical
Product update
News

The Zero-Day Collapse: The Case for Continuous AI Red Teaming
Mar 9, 2026
|
10 min read

MCP Security: Why Best Practices Aren't Enough (And What Actually Works)
Mar 4, 2026
|
11 min read

Shadow AI: The Unauthorized AI Tools Already Running Inside Your Enterprise
Mar 1, 2026
|
10 min read

AI Security Posture Management (AI-SPM): The Complete Enterprise Guide
Mar 1, 2026
|
8 min read

Prompt Injection: The Definitive Technical Guide (2026)
Mar 1, 2026
|
12 min read

Pentesting Agentic AI: Why the methodology changes when your LLM has tool access
Mar 1, 2026
|
8 min read

The Agentic AI security threat landscape in 2026: what attackers are actually doing
Feb 28, 2026
|
10 min read

AI Agent Skill Scanners: Every Tool Compared (2026)
Feb 24, 2026
|
5 min read

Cisco Skill Scanner: What It Does, What It Misses, and When to Use Something Else
Feb 24, 2026
|
5 min read

Claude Code Skill Security: How to Audit Any Skill Before You Run It
Feb 24, 2026
|
7 min read

ClawHavoc: Inside the Supply Chain Attack That Targeted 300,000 AI Agent Users
Feb 24, 2026
|
8 min read

What is an AI security solution? A buyer's guide for security and engineering teams
Feb 23, 2026
|
9 min read

What Is LLM Pentesting? A Practical Guide for Security Teams
Feb 23, 2026
|
12 min read

What is dark AI? The security risks of uncensored and unvetted models
Feb 23, 2026
|
5 min read

Securing ML models: the complete guide to ML model security in 2026
Feb 23, 2026
|
5 min read

Claude Code Security Finds Bugs in Your Code. It Won't Secure Your AI Applications.
Feb 21, 2026
|
5 min read

ML Model Security vs. LLM Security: What's the Difference and Why You Need Both
Feb 20, 2026
|
7 min read

Emoji Prompt Injection: Why Your LLM's Guardrails Are Blind to It
Feb 19, 2026
|
10 min read

OWASP Agentic AI Top 10: Enterprise Security Roadmap for 2026
Feb 17, 2026
|
15 min read

Malicious OpenClaw Skills Exposed: A Full Teardown
Feb 16, 2026
|
3 min read

OpenClaw Security Best Practices: A Technical Deployment Checklist
Feb 16, 2026
|
10 min read

Standardizing Trust: Repello AI Named in Gartner’s Emerging Tech Report for Agentic AI Security
Jan 22, 2026
|
3 min read

Claude for Chrome goes rogue to leak ACCESS TOKENS!: Hijacking via Task Injection
Jan 8, 2026
|
8 min read

Security Robustness in Agentic AI: A Comparative Study of GPT-5.1, GPT-5.2, and Claude Opus 4.5
Dec 24, 2025
|
8 min read

Gemini Mobile's Consent Persistence: Weaponizing Google Docs summary for Geolocation Exfil
Dec 17, 2025
|
6 min read

Introducing new Multilingual AI Safety Guardrails for 100 Languages
Dec 2, 2025
|
5 min read

Zero-Click Exfiltration: Why "Expected Behavior" in Google’s Antigravity is a Security Crisis
Nov 28, 2025
|
10 min read

Winter is Coming... for Your AI Agents: The Evolving Threat Landscape of Real-World Attacks
Nov 4, 2025
|
9 min read

Introducing AI Asset Inventory: See Your AI. Secure Your AI.
Oct 31, 2025
|
5 min read

Validating Enterprise AI Security: Repello’s Red Teaming Assessment of Lyzr AI Agents
Dec 2, 2025
|
7 min read

Hacktoberfest 2025: Contribute to AI Security with Repello AI!
Oct 6, 2025
|
3 min read

ChatGPT MCP Connector Security Vulnerability: Zero-Click Data Exfiltration Attack
Sep 24, 2025
|
10 min read

Introducing ARTEMIS Browser Mode: Red-Team Your AI Applications Like a Human Would
Sep 23, 2025
|
10 min read

VANTAGE: A framework for Enterprise AI-SPM built on rigorous AI asset inventorisation
Aug 22, 2025
|
10 min read

Exploiting Zapier’s Gmail auto-reply agent for data exfiltration
Jul 24, 2025
|
6 min read

Security threats in Agentic AI Browsers
Jul 15, 2025
|
6 min read

Zero-Click Calendar Exfiltration Reveals MCP Security Risk in 11.ai
Jul 10, 2025
|
6 min read

Introducing ARGUS: Runtime Security Layer for your GenAI systems
Jun 19, 2025
|
6 min read

BIG NEWS: Repello AI Raises $1.2M to Secure the future of AI 🚀
Jun 16, 2025
|
9 min read

When the Model Grades the Model: Demystifying ‘LLM-as-a-Judge’ for Practitioners
May 28, 2025
|
9 min read

Ghibli Dreams vs. Adversarial Schemes: Attacks on Diffusion Models
May 15, 2025
|
9 min read

Turning Background Noise into a Prompt Injection Attacks in Voice AI
May 15, 2025
|
9 min read

MCP tool poisoning to RCE
Apr 17, 2025
|
9 min read

Securing Machine Learning Models: A Comprehensive Guide to Model Scanning
Apr 4, 2025
|
6 min read

Repello AI and LimeChat Join Forces to Make AI Chatbots More Secure
Mar 25, 2025
|
4 min read

Introducing ARTEMIS: Automated Red Teaming to Secure your AI applications
Mar 18, 2025
|
5 min read

Prompt Injection using Emojis🤯🫣😈👻
Mar 4, 2025
|
5 min read

Distilled, but Dangerous? Assessing the Safety of Models Derived from DeepSeek-R1
Feb 19, 2025
|
5 min read

Introducing Matrix AI Security Challenge: An Immersive Cyberpunk Hacking Game
Feb 7, 2025
|
3 min read

LLM Evaluation Metrics, Frameworks, and Checklist in 2024
Oct 29, 2024
|
23 min read

10 prompt injection attack examples
Oct 28, 2024
|
17 min read

LLM Pentesting: The 2026 Checklist, Methodology, and Tools
Feb 20, 2026
|
9 min read

Data Security and Privacy for AI Systems
Oct 20, 2024
|
14 min read

Protect AI Key Features and Alternatives
Sep 10, 2024
|
8 min read

HiddenLayer Key Features and Alternatives
Sep 9, 2024
|
7 min read

Top 7 LLM Red Teaming Platforms in 2024
Oct 7, 2024
|
8 min read

The OWASP Top 10 for Large Language Models Explained for CISOs: Part 2
Sep 20, 2024
|
10 min read

The OWASP Top 10 for Large Language Models Explained for CISOs: Part 1
Sep 19, 2024
|
11 min read

How to Secure Your AI Applications: Essential Strategies for Safety
Sep 18, 2024
|
7 min read

Protecting Your AI Models: Simple Strategies for Security
Sep 17, 2024
|
6 min read
All Blogs
Attack
Technical
Product update
News

The Zero-Day Collapse: The Case for Continuous AI Red Teaming
Mar 9, 2026
|
10 min read

MCP Security: Why Best Practices Aren't Enough (And What Actually Works)
Mar 4, 2026
|
11 min read

Shadow AI: The Unauthorized AI Tools Already Running Inside Your Enterprise
Mar 1, 2026
|
10 min read

AI Security Posture Management (AI-SPM): The Complete Enterprise Guide
Mar 1, 2026
|
8 min read

Prompt Injection: The Definitive Technical Guide (2026)
Mar 1, 2026
|
12 min read

Pentesting Agentic AI: Why the methodology changes when your LLM has tool access
Mar 1, 2026
|
8 min read

The Agentic AI security threat landscape in 2026: what attackers are actually doing
Feb 28, 2026
|
10 min read

AI Agent Skill Scanners: Every Tool Compared (2026)
Feb 24, 2026
|
5 min read

Cisco Skill Scanner: What It Does, What It Misses, and When to Use Something Else
Feb 24, 2026
|
5 min read

Claude Code Skill Security: How to Audit Any Skill Before You Run It
Feb 24, 2026
|
7 min read

ClawHavoc: Inside the Supply Chain Attack That Targeted 300,000 AI Agent Users
Feb 24, 2026
|
8 min read

What is an AI security solution? A buyer's guide for security and engineering teams
Feb 23, 2026
|
9 min read

What Is LLM Pentesting? A Practical Guide for Security Teams
Feb 23, 2026
|
12 min read

What is dark AI? The security risks of uncensored and unvetted models
Feb 23, 2026
|
5 min read

Securing ML models: the complete guide to ML model security in 2026
Feb 23, 2026
|
5 min read

Claude Code Security Finds Bugs in Your Code. It Won't Secure Your AI Applications.
Feb 21, 2026
|
5 min read

ML Model Security vs. LLM Security: What's the Difference and Why You Need Both
Feb 20, 2026
|
7 min read

Emoji Prompt Injection: Why Your LLM's Guardrails Are Blind to It
Feb 19, 2026
|
10 min read

OWASP Agentic AI Top 10: Enterprise Security Roadmap for 2026
Feb 17, 2026
|
15 min read

Malicious OpenClaw Skills Exposed: A Full Teardown
Feb 16, 2026
|
3 min read

OpenClaw Security Best Practices: A Technical Deployment Checklist
Feb 16, 2026
|
10 min read

Standardizing Trust: Repello AI Named in Gartner’s Emerging Tech Report for Agentic AI Security
Jan 22, 2026
|
3 min read

Claude for Chrome goes rogue to leak ACCESS TOKENS!: Hijacking via Task Injection
Jan 8, 2026
|
8 min read

Security Robustness in Agentic AI: A Comparative Study of GPT-5.1, GPT-5.2, and Claude Opus 4.5
Dec 24, 2025
|
8 min read

Gemini Mobile's Consent Persistence: Weaponizing Google Docs summary for Geolocation Exfil
Dec 17, 2025
|
6 min read

Introducing new Multilingual AI Safety Guardrails for 100 Languages
Dec 2, 2025
|
5 min read

Zero-Click Exfiltration: Why "Expected Behavior" in Google’s Antigravity is a Security Crisis
Nov 28, 2025
|
10 min read

Winter is Coming... for Your AI Agents: The Evolving Threat Landscape of Real-World Attacks
Nov 4, 2025
|
9 min read

Introducing AI Asset Inventory: See Your AI. Secure Your AI.
Oct 31, 2025
|
5 min read

Validating Enterprise AI Security: Repello’s Red Teaming Assessment of Lyzr AI Agents
Dec 2, 2025
|
7 min read

Hacktoberfest 2025: Contribute to AI Security with Repello AI!
Oct 6, 2025
|
3 min read

ChatGPT MCP Connector Security Vulnerability: Zero-Click Data Exfiltration Attack
Sep 24, 2025
|
10 min read

Introducing ARTEMIS Browser Mode: Red-Team Your AI Applications Like a Human Would
Sep 23, 2025
|
10 min read

VANTAGE: A framework for Enterprise AI-SPM built on rigorous AI asset inventorisation
Aug 22, 2025
|
10 min read

Exploiting Zapier’s Gmail auto-reply agent for data exfiltration
Jul 24, 2025
|
6 min read

Security threats in Agentic AI Browsers
Jul 15, 2025
|
6 min read

Zero-Click Calendar Exfiltration Reveals MCP Security Risk in 11.ai
Jul 10, 2025
|
6 min read

Introducing ARGUS: Runtime Security Layer for your GenAI systems
Jun 19, 2025
|
6 min read

BIG NEWS: Repello AI Raises $1.2M to Secure the future of AI 🚀
Jun 16, 2025
|
9 min read

When the Model Grades the Model: Demystifying ‘LLM-as-a-Judge’ for Practitioners
May 28, 2025
|
9 min read

Ghibli Dreams vs. Adversarial Schemes: Attacks on Diffusion Models
May 15, 2025
|
9 min read

Turning Background Noise into a Prompt Injection Attacks in Voice AI
May 15, 2025
|
9 min read

MCP tool poisoning to RCE
Apr 17, 2025
|
9 min read

Securing Machine Learning Models: A Comprehensive Guide to Model Scanning
Apr 4, 2025
|
6 min read

Repello AI and LimeChat Join Forces to Make AI Chatbots More Secure
Mar 25, 2025
|
4 min read

Introducing ARTEMIS: Automated Red Teaming to Secure your AI applications
Mar 18, 2025
|
5 min read

Prompt Injection using Emojis🤯🫣😈👻
Mar 4, 2025
|
5 min read

Distilled, but Dangerous? Assessing the Safety of Models Derived from DeepSeek-R1
Feb 19, 2025
|
5 min read

Introducing Matrix AI Security Challenge: An Immersive Cyberpunk Hacking Game
Feb 7, 2025
|
3 min read

LLM Evaluation Metrics, Frameworks, and Checklist in 2024
Oct 29, 2024
|
23 min read

10 prompt injection attack examples
Oct 28, 2024
|
17 min read

LLM Pentesting: The 2026 Checklist, Methodology, and Tools
Feb 20, 2026
|
9 min read

Data Security and Privacy for AI Systems
Oct 20, 2024
|
14 min read

Protect AI Key Features and Alternatives
Sep 10, 2024
|
8 min read

HiddenLayer Key Features and Alternatives
Sep 9, 2024
|
7 min read

Top 7 LLM Red Teaming Platforms in 2024
Oct 7, 2024
|
8 min read

The OWASP Top 10 for Large Language Models Explained for CISOs: Part 2
Sep 20, 2024
|
10 min read

The OWASP Top 10 for Large Language Models Explained for CISOs: Part 1
Sep 19, 2024
|
11 min read

How to Secure Your AI Applications: Essential Strategies for Safety
Sep 18, 2024
|
7 min read

Protecting Your AI Models: Simple Strategies for Security
Sep 17, 2024
|
6 min read

8 The Green, Ste A
Dover, DE 19901, United States of America

8 The Green, Ste A
Dover, DE 19901, United States of America



