Blog on AI security
trends and innovations


Blog on AI security
trends and innovations


Subscribe to our newsletter

Repello tech background with grid pattern symbolizing AI security
Repello logo - background
Repello tech background with grid pattern symbolizing AI security
Repello tech background with grid pattern symbolizing AI security

All Blogs

Attack

Technical

Product update

News

The Zero-Day Collapse: The Case for Continuous AI Red Teaming

The Zero-Day Collapse: The Case for Continuous AI Red Teaming

Mar 9, 2026

|

10 min read

MCP Security: Why Best Practices Aren't Enough (And What Actually Works)

MCP Security: Why Best Practices Aren't Enough (And What Actually Works)

Mar 4, 2026

|

11 min read

Shadow AI: The Unauthorized AI Tools Already Running Inside Your Enterprise

Shadow AI: The Unauthorized AI Tools Already Running Inside Your Enterprise

Mar 1, 2026

|

10 min read

AI Security Posture Management (AI-SPM): The Complete Enterprise Guide

AI Security Posture Management (AI-SPM): The Complete Enterprise Guide

Mar 1, 2026

|

8 min read

Prompt injection: the definitive technical guide (2026)

Prompt Injection: The Definitive Technical Guide (2026)

Mar 1, 2026

|

12 min read

Pentesting Agentic AI: Why the methodology changes when your LLM has tool access

Pentesting Agentic AI: Why the methodology changes when your LLM has tool access

Mar 1, 2026

|

8 min read

The Agentic AI security threat landscape in 2026: what attackers are actually doing

The Agentic AI security threat landscape in 2026: what attackers are actually doing

Feb 28, 2026

|

10 min read

 AI Agent Skill Scanners: Every Tool Compared (2026)

AI Agent Skill Scanners: Every Tool Compared (2026)

Feb 24, 2026

|

5 min read

Cisco Skill Scanner: What It Does, What It Misses, and When to Use Something Else

Cisco Skill Scanner: What It Does, What It Misses, and When to Use Something Else

Feb 24, 2026

|

5 min read

Claude Code Skill Security: How to Audit Any Skill Before You Run It

Claude Code Skill Security: How to Audit Any Skill Before You Run It

Feb 24, 2026

|

7 min read

ClawHavoc: Inside the Supply Chain Attack That Targeted 300,000 AI Agent Users

ClawHavoc: Inside the Supply Chain Attack That Targeted 300,000 AI Agent Users

Feb 24, 2026

|

8 min read

What is an AI security solution? A buyer's guide for security and engineering teams

What is an AI security solution? A buyer's guide for security and engineering teams

Feb 23, 2026

|

9 min read

What Is LLM Pentesting? A Practical Guide for Security Teams

What Is LLM Pentesting? A Practical Guide for Security Teams

Feb 23, 2026

|

12 min read

What is dark AI? The security risks of uncensored and unvetted models

What is dark AI? The security risks of uncensored and unvetted models

Feb 23, 2026

|

5 min read

Securing ML models: the complete guide to ML model security in 2026

Securing ML models: the complete guide to ML model security in 2026

Feb 23, 2026

|

5 min read

Claude Code Security Finds Bugs in Your Code. It Won't Secure Your AI Applications.

Claude Code Security Finds Bugs in Your Code. It Won't Secure Your AI Applications.

Feb 21, 2026

|

5 min read

ML Model Security vs. LLM Security: What's the Difference and Why You Need Both

Feb 20, 2026

|

7 min read

Emoji Prompt Injection: Why Your LLM's Guardrails Are Blind to It

Emoji Prompt Injection: Why Your LLM's Guardrails Are Blind to It

Feb 19, 2026

|

10 min read

OWASP Agentic AI Top 10: Enterprise Security Roadmap for 2026

Feb 17, 2026

|

15 min read

Blog cover image of: Malicious OpenClaw Skills Exposed: A Full Teardown

Malicious OpenClaw Skills Exposed: A Full Teardown

Feb 16, 2026

|

3 min read

OpenClaw security deployment checklist - Repello AI technical best practices guide

OpenClaw Security Best Practices: A Technical Deployment Checklist

Feb 16, 2026

|

10 min read

Standardizing Trust: Repello AI Named in Gartner’s Emerging Tech Report for Agentic AI Security

Jan 22, 2026

|

3 min read

Claude for Chrome goes rogue to leak ACCESS TOKENS!: Hijacking via Task Injection

Jan 8, 2026

|

8 min read

Security Robustness in Agentic AI: A Comparative Study of GPT-5.1, GPT-5.2, and Claude Opus 4.5

Dec 24, 2025

|

8 min read

Gemini Mobile's Consent Persistence: Weaponizing Google Docs summary for Geolocation Exfil

Gemini Mobile's Consent Persistence: Weaponizing Google Docs summary for Geolocation Exfil

Dec 17, 2025

|

6 min read

Introducing new Multilingual AI Safety Guardrails for 100 Languages

Dec 2, 2025

|

5 min read

Zero-Click Exfiltration: Why "Expected Behavior" in Google’s Antigravity is a Security Crisis

Nov 28, 2025

|

10 min read

Winter is Coming... for Your AI Agents: The Evolving Threat Landscape of Real-World Attacks

Nov 4, 2025

|

9 min read

Introducing AI Asset Inventory: See Your AI. Secure Your AI.

Oct 31, 2025

|

5 min read

Validating Enterprise AI Security: Repello’s Red Teaming Assessment of Lyzr AI Agents

Dec 2, 2025

|

7 min read

Hacktoberfest 2025: Contribute to AI Security with Repello AI!

Oct 6, 2025

|

3 min read

ChatGPT MCP Connector Security Vulnerability: Zero-Click Data Exfiltration Attack

Sep 24, 2025

|

10 min read

Introducing ARTEMIS Browser Mode: Red-Team Your AI Applications Like a Human Would

Sep 23, 2025

|

10 min read

VANTAGE: A framework for Enterprise AI-SPM built on rigorous AI asset inventorisation

Aug 22, 2025

|

10 min read

Exploiting Zapier’s Gmail auto-reply agent for data exfiltration

Exploiting Zapier’s Gmail auto-reply agent for data exfiltration

Jul 24, 2025

|

6 min read

Security threats in Agentic AI Browsers

Jul 15, 2025

|

6 min read

Zero-Click Calendar Exfiltration Reveals MCP Security Risk in 11.ai

Zero-Click Calendar Exfiltration Reveals MCP Security Risk in 11.ai

Jul 10, 2025

|

6 min read

Introducing ARGUS: AI runtime security by Repello, with images of dashboard

Introducing ARGUS: Runtime Security Layer for your GenAI systems

Jun 19, 2025

|

6 min read

BIG NEWS: Repello AI Raises $1.2M to Secure the future of AI 🚀

Jun 16, 2025

|

9 min read

When the Model Grades the Model: Demystifying ‘LLM-as-a-Judge’ for Practitioners

May 28, 2025

|

9 min read

Ghibli Dreams vs. Adversarial Schemes: Attacks on Diffusion Models

May 15, 2025

|

9 min read

Turning Background Noise into a Prompt Injection Attacks in Voice AI

May 15, 2025

|

9 min read

MCP tool poisoning to RCE

Apr 17, 2025

|

9 min read

Securing Machine Learning Models: A Comprehensive Guide to Model Scanning

Apr 4, 2025

|

6 min read

Repello AI and LimeChat Join Forces to Make AI Chatbots More Secure

Mar 25, 2025

|

4 min read

Introducing ARTEMIS: Automated Red Teaming to Secure your AI applications

Mar 18, 2025

|

5 min read

Prompt Injection using Emojis🤯🫣😈👻

Mar 4, 2025

|

5 min read

Distilled, but Dangerous? Assessing the Safety of Models Derived from DeepSeek-R1

Feb 19, 2025

|

5 min read

Introducing Matrix AI Security Challenge: An Immersive Cyberpunk Hacking Game

Feb 7, 2025

|

3 min read

AI Evaluation, Metrics, Frameworks, & Checklist

LLM Evaluation Metrics, Frameworks, and Checklist in 2024

Oct 29, 2024

|

23 min read

Prompt injection attack examples

10 prompt injection attack examples

Oct 28, 2024

|

17 min read

LLM Pentesting: Checklist and Tools

LLM Pentesting: The 2026 Checklist, Methodology, and Tools

Feb 20, 2026

|

9 min read

Data security and Privacy

Data Security and Privacy for AI Systems

Oct 20, 2024

|

14 min read

Protect AI Key Features and Alternatives.

Protect AI Key Features and Alternatives

Sep 10, 2024

|

8 min read

HiddenLayer Best Features and Alternatives

HiddenLayer Key Features and Alternatives

Sep 9, 2024

|

7 min read

Best LLM Red Teaming Platforms

Top 7 LLM Red Teaming Platforms in 2024

Oct 7, 2024

|

8 min read

OWASP top 10 for LLMs part 2

The OWASP Top 10 for Large Language Models Explained for CISOs: Part 2

Sep 20, 2024

|

10 min read

OWASP Top 10 for LLMs for CISO Part 1

The OWASP Top 10 for Large Language Models Explained for CISOs: Part 1

Sep 19, 2024

|

11 min read

How to secure AI Applications

How to Secure Your AI Applications: Essential Strategies for Safety

Sep 18, 2024

|

7 min read

How to secure AI models

Protecting Your AI Models: Simple Strategies for Security

Sep 17, 2024

|

6 min read

All Blogs

Attack

Technical

Product update

News

The Zero-Day Collapse: The Case for Continuous AI Red Teaming

The Zero-Day Collapse: The Case for Continuous AI Red Teaming

Mar 9, 2026

|

10 min read

MCP Security: Why Best Practices Aren't Enough (And What Actually Works)

MCP Security: Why Best Practices Aren't Enough (And What Actually Works)

Mar 4, 2026

|

11 min read

Shadow AI: The Unauthorized AI Tools Already Running Inside Your Enterprise

Shadow AI: The Unauthorized AI Tools Already Running Inside Your Enterprise

Mar 1, 2026

|

10 min read

AI Security Posture Management (AI-SPM): The Complete Enterprise Guide

AI Security Posture Management (AI-SPM): The Complete Enterprise Guide

Mar 1, 2026

|

8 min read

Prompt injection: the definitive technical guide (2026)

Prompt Injection: The Definitive Technical Guide (2026)

Mar 1, 2026

|

12 min read

Pentesting Agentic AI: Why the methodology changes when your LLM has tool access

Pentesting Agentic AI: Why the methodology changes when your LLM has tool access

Mar 1, 2026

|

8 min read

The Agentic AI security threat landscape in 2026: what attackers are actually doing

The Agentic AI security threat landscape in 2026: what attackers are actually doing

Feb 28, 2026

|

10 min read

 AI Agent Skill Scanners: Every Tool Compared (2026)

AI Agent Skill Scanners: Every Tool Compared (2026)

Feb 24, 2026

|

5 min read

Cisco Skill Scanner: What It Does, What It Misses, and When to Use Something Else

Cisco Skill Scanner: What It Does, What It Misses, and When to Use Something Else

Feb 24, 2026

|

5 min read

Claude Code Skill Security: How to Audit Any Skill Before You Run It

Claude Code Skill Security: How to Audit Any Skill Before You Run It

Feb 24, 2026

|

7 min read

ClawHavoc: Inside the Supply Chain Attack That Targeted 300,000 AI Agent Users

ClawHavoc: Inside the Supply Chain Attack That Targeted 300,000 AI Agent Users

Feb 24, 2026

|

8 min read

What is an AI security solution? A buyer's guide for security and engineering teams

What is an AI security solution? A buyer's guide for security and engineering teams

Feb 23, 2026

|

9 min read

What Is LLM Pentesting? A Practical Guide for Security Teams

What Is LLM Pentesting? A Practical Guide for Security Teams

Feb 23, 2026

|

12 min read

What is dark AI? The security risks of uncensored and unvetted models

What is dark AI? The security risks of uncensored and unvetted models

Feb 23, 2026

|

5 min read

Securing ML models: the complete guide to ML model security in 2026

Securing ML models: the complete guide to ML model security in 2026

Feb 23, 2026

|

5 min read

Claude Code Security Finds Bugs in Your Code. It Won't Secure Your AI Applications.

Claude Code Security Finds Bugs in Your Code. It Won't Secure Your AI Applications.

Feb 21, 2026

|

5 min read

ML Model Security vs. LLM Security: What's the Difference and Why You Need Both

Feb 20, 2026

|

7 min read

Emoji Prompt Injection: Why Your LLM's Guardrails Are Blind to It

Emoji Prompt Injection: Why Your LLM's Guardrails Are Blind to It

Feb 19, 2026

|

10 min read

OWASP Agentic AI Top 10: Enterprise Security Roadmap for 2026

Feb 17, 2026

|

15 min read

Blog cover image of: Malicious OpenClaw Skills Exposed: A Full Teardown

Malicious OpenClaw Skills Exposed: A Full Teardown

Feb 16, 2026

|

3 min read

OpenClaw security deployment checklist - Repello AI technical best practices guide

OpenClaw Security Best Practices: A Technical Deployment Checklist

Feb 16, 2026

|

10 min read

Standardizing Trust: Repello AI Named in Gartner’s Emerging Tech Report for Agentic AI Security

Jan 22, 2026

|

3 min read

Claude for Chrome goes rogue to leak ACCESS TOKENS!: Hijacking via Task Injection

Jan 8, 2026

|

8 min read

Security Robustness in Agentic AI: A Comparative Study of GPT-5.1, GPT-5.2, and Claude Opus 4.5

Dec 24, 2025

|

8 min read

Gemini Mobile's Consent Persistence: Weaponizing Google Docs summary for Geolocation Exfil

Gemini Mobile's Consent Persistence: Weaponizing Google Docs summary for Geolocation Exfil

Dec 17, 2025

|

6 min read

Introducing new Multilingual AI Safety Guardrails for 100 Languages

Dec 2, 2025

|

5 min read

Zero-Click Exfiltration: Why "Expected Behavior" in Google’s Antigravity is a Security Crisis

Nov 28, 2025

|

10 min read

Winter is Coming... for Your AI Agents: The Evolving Threat Landscape of Real-World Attacks

Nov 4, 2025

|

9 min read

Introducing AI Asset Inventory: See Your AI. Secure Your AI.

Oct 31, 2025

|

5 min read

Validating Enterprise AI Security: Repello’s Red Teaming Assessment of Lyzr AI Agents

Dec 2, 2025

|

7 min read

Hacktoberfest 2025: Contribute to AI Security with Repello AI!

Oct 6, 2025

|

3 min read

ChatGPT MCP Connector Security Vulnerability: Zero-Click Data Exfiltration Attack

Sep 24, 2025

|

10 min read

Introducing ARTEMIS Browser Mode: Red-Team Your AI Applications Like a Human Would

Sep 23, 2025

|

10 min read

VANTAGE: A framework for Enterprise AI-SPM built on rigorous AI asset inventorisation

Aug 22, 2025

|

10 min read

Exploiting Zapier’s Gmail auto-reply agent for data exfiltration

Exploiting Zapier’s Gmail auto-reply agent for data exfiltration

Jul 24, 2025

|

6 min read

Security threats in Agentic AI Browsers

Jul 15, 2025

|

6 min read

Zero-Click Calendar Exfiltration Reveals MCP Security Risk in 11.ai

Zero-Click Calendar Exfiltration Reveals MCP Security Risk in 11.ai

Jul 10, 2025

|

6 min read

Introducing ARGUS: AI runtime security by Repello, with images of dashboard

Introducing ARGUS: Runtime Security Layer for your GenAI systems

Jun 19, 2025

|

6 min read

BIG NEWS: Repello AI Raises $1.2M to Secure the future of AI 🚀

Jun 16, 2025

|

9 min read

When the Model Grades the Model: Demystifying ‘LLM-as-a-Judge’ for Practitioners

May 28, 2025

|

9 min read

Ghibli Dreams vs. Adversarial Schemes: Attacks on Diffusion Models

May 15, 2025

|

9 min read

Turning Background Noise into a Prompt Injection Attacks in Voice AI

May 15, 2025

|

9 min read

MCP tool poisoning to RCE

Apr 17, 2025

|

9 min read

Securing Machine Learning Models: A Comprehensive Guide to Model Scanning

Apr 4, 2025

|

6 min read

Repello AI and LimeChat Join Forces to Make AI Chatbots More Secure

Mar 25, 2025

|

4 min read

Introducing ARTEMIS: Automated Red Teaming to Secure your AI applications

Mar 18, 2025

|

5 min read

Prompt Injection using Emojis🤯🫣😈👻

Mar 4, 2025

|

5 min read

Distilled, but Dangerous? Assessing the Safety of Models Derived from DeepSeek-R1

Feb 19, 2025

|

5 min read

Introducing Matrix AI Security Challenge: An Immersive Cyberpunk Hacking Game

Feb 7, 2025

|

3 min read

AI Evaluation, Metrics, Frameworks, & Checklist

LLM Evaluation Metrics, Frameworks, and Checklist in 2024

Oct 29, 2024

|

23 min read

Prompt injection attack examples

10 prompt injection attack examples

Oct 28, 2024

|

17 min read

LLM Pentesting: Checklist and Tools

LLM Pentesting: The 2026 Checklist, Methodology, and Tools

Feb 20, 2026

|

9 min read

Data security and Privacy

Data Security and Privacy for AI Systems

Oct 20, 2024

|

14 min read

Protect AI Key Features and Alternatives.

Protect AI Key Features and Alternatives

Sep 10, 2024

|

8 min read

HiddenLayer Best Features and Alternatives

HiddenLayer Key Features and Alternatives

Sep 9, 2024

|

7 min read

Best LLM Red Teaming Platforms

Top 7 LLM Red Teaming Platforms in 2024

Oct 7, 2024

|

8 min read

OWASP top 10 for LLMs part 2

The OWASP Top 10 for Large Language Models Explained for CISOs: Part 2

Sep 20, 2024

|

10 min read

OWASP Top 10 for LLMs for CISO Part 1

The OWASP Top 10 for Large Language Models Explained for CISOs: Part 1

Sep 19, 2024

|

11 min read

How to secure AI Applications

How to Secure Your AI Applications: Essential Strategies for Safety

Sep 18, 2024

|

7 min read

How to secure AI models

Protecting Your AI Models: Simple Strategies for Security

Sep 17, 2024

|

6 min read

All Blogs

Attack

Technical

Product update

News

The Zero-Day Collapse: The Case for Continuous AI Red Teaming

The Zero-Day Collapse: The Case for Continuous AI Red Teaming

Mar 9, 2026

|

10 min read

MCP Security: Why Best Practices Aren't Enough (And What Actually Works)

MCP Security: Why Best Practices Aren't Enough (And What Actually Works)

Mar 4, 2026

|

11 min read

Shadow AI: The Unauthorized AI Tools Already Running Inside Your Enterprise

Shadow AI: The Unauthorized AI Tools Already Running Inside Your Enterprise

Mar 1, 2026

|

10 min read

AI Security Posture Management (AI-SPM): The Complete Enterprise Guide

AI Security Posture Management (AI-SPM): The Complete Enterprise Guide

Mar 1, 2026

|

8 min read

Prompt injection: the definitive technical guide (2026)

Prompt Injection: The Definitive Technical Guide (2026)

Mar 1, 2026

|

12 min read

Pentesting Agentic AI: Why the methodology changes when your LLM has tool access

Pentesting Agentic AI: Why the methodology changes when your LLM has tool access

Mar 1, 2026

|

8 min read

The Agentic AI security threat landscape in 2026: what attackers are actually doing

The Agentic AI security threat landscape in 2026: what attackers are actually doing

Feb 28, 2026

|

10 min read

 AI Agent Skill Scanners: Every Tool Compared (2026)

AI Agent Skill Scanners: Every Tool Compared (2026)

Feb 24, 2026

|

5 min read

Cisco Skill Scanner: What It Does, What It Misses, and When to Use Something Else

Cisco Skill Scanner: What It Does, What It Misses, and When to Use Something Else

Feb 24, 2026

|

5 min read

Claude Code Skill Security: How to Audit Any Skill Before You Run It

Claude Code Skill Security: How to Audit Any Skill Before You Run It

Feb 24, 2026

|

7 min read

ClawHavoc: Inside the Supply Chain Attack That Targeted 300,000 AI Agent Users

ClawHavoc: Inside the Supply Chain Attack That Targeted 300,000 AI Agent Users

Feb 24, 2026

|

8 min read

What is an AI security solution? A buyer's guide for security and engineering teams

What is an AI security solution? A buyer's guide for security and engineering teams

Feb 23, 2026

|

9 min read

What Is LLM Pentesting? A Practical Guide for Security Teams

What Is LLM Pentesting? A Practical Guide for Security Teams

Feb 23, 2026

|

12 min read

What is dark AI? The security risks of uncensored and unvetted models

What is dark AI? The security risks of uncensored and unvetted models

Feb 23, 2026

|

5 min read

Securing ML models: the complete guide to ML model security in 2026

Securing ML models: the complete guide to ML model security in 2026

Feb 23, 2026

|

5 min read

Claude Code Security Finds Bugs in Your Code. It Won't Secure Your AI Applications.

Claude Code Security Finds Bugs in Your Code. It Won't Secure Your AI Applications.

Feb 21, 2026

|

5 min read

ML Model Security vs. LLM Security: What's the Difference and Why You Need Both

Feb 20, 2026

|

7 min read

Emoji Prompt Injection: Why Your LLM's Guardrails Are Blind to It

Emoji Prompt Injection: Why Your LLM's Guardrails Are Blind to It

Feb 19, 2026

|

10 min read

OWASP Agentic AI Top 10: Enterprise Security Roadmap for 2026

Feb 17, 2026

|

15 min read

Blog cover image of: Malicious OpenClaw Skills Exposed: A Full Teardown

Malicious OpenClaw Skills Exposed: A Full Teardown

Feb 16, 2026

|

3 min read

OpenClaw security deployment checklist - Repello AI technical best practices guide

OpenClaw Security Best Practices: A Technical Deployment Checklist

Feb 16, 2026

|

10 min read

Standardizing Trust: Repello AI Named in Gartner’s Emerging Tech Report for Agentic AI Security

Jan 22, 2026

|

3 min read

Claude for Chrome goes rogue to leak ACCESS TOKENS!: Hijacking via Task Injection

Jan 8, 2026

|

8 min read

Security Robustness in Agentic AI: A Comparative Study of GPT-5.1, GPT-5.2, and Claude Opus 4.5

Dec 24, 2025

|

8 min read

Gemini Mobile's Consent Persistence: Weaponizing Google Docs summary for Geolocation Exfil

Gemini Mobile's Consent Persistence: Weaponizing Google Docs summary for Geolocation Exfil

Dec 17, 2025

|

6 min read

Introducing new Multilingual AI Safety Guardrails for 100 Languages

Dec 2, 2025

|

5 min read

Zero-Click Exfiltration: Why "Expected Behavior" in Google’s Antigravity is a Security Crisis

Nov 28, 2025

|

10 min read

Winter is Coming... for Your AI Agents: The Evolving Threat Landscape of Real-World Attacks

Nov 4, 2025

|

9 min read

Introducing AI Asset Inventory: See Your AI. Secure Your AI.

Oct 31, 2025

|

5 min read

Validating Enterprise AI Security: Repello’s Red Teaming Assessment of Lyzr AI Agents

Dec 2, 2025

|

7 min read

Hacktoberfest 2025: Contribute to AI Security with Repello AI!

Oct 6, 2025

|

3 min read

ChatGPT MCP Connector Security Vulnerability: Zero-Click Data Exfiltration Attack

Sep 24, 2025

|

10 min read

Introducing ARTEMIS Browser Mode: Red-Team Your AI Applications Like a Human Would

Sep 23, 2025

|

10 min read

VANTAGE: A framework for Enterprise AI-SPM built on rigorous AI asset inventorisation

Aug 22, 2025

|

10 min read

Exploiting Zapier’s Gmail auto-reply agent for data exfiltration

Exploiting Zapier’s Gmail auto-reply agent for data exfiltration

Jul 24, 2025

|

6 min read

Security threats in Agentic AI Browsers

Jul 15, 2025

|

6 min read

Zero-Click Calendar Exfiltration Reveals MCP Security Risk in 11.ai

Zero-Click Calendar Exfiltration Reveals MCP Security Risk in 11.ai

Jul 10, 2025

|

6 min read

Introducing ARGUS: AI runtime security by Repello, with images of dashboard

Introducing ARGUS: Runtime Security Layer for your GenAI systems

Jun 19, 2025

|

6 min read

BIG NEWS: Repello AI Raises $1.2M to Secure the future of AI 🚀

Jun 16, 2025

|

9 min read

When the Model Grades the Model: Demystifying ‘LLM-as-a-Judge’ for Practitioners

May 28, 2025

|

9 min read

Ghibli Dreams vs. Adversarial Schemes: Attacks on Diffusion Models

May 15, 2025

|

9 min read

Turning Background Noise into a Prompt Injection Attacks in Voice AI

May 15, 2025

|

9 min read

MCP tool poisoning to RCE

Apr 17, 2025

|

9 min read

Securing Machine Learning Models: A Comprehensive Guide to Model Scanning

Apr 4, 2025

|

6 min read

Repello AI and LimeChat Join Forces to Make AI Chatbots More Secure

Mar 25, 2025

|

4 min read

Introducing ARTEMIS: Automated Red Teaming to Secure your AI applications

Mar 18, 2025

|

5 min read

Prompt Injection using Emojis🤯🫣😈👻

Mar 4, 2025

|

5 min read

Distilled, but Dangerous? Assessing the Safety of Models Derived from DeepSeek-R1

Feb 19, 2025

|

5 min read

Introducing Matrix AI Security Challenge: An Immersive Cyberpunk Hacking Game

Feb 7, 2025

|

3 min read

AI Evaluation, Metrics, Frameworks, & Checklist

LLM Evaluation Metrics, Frameworks, and Checklist in 2024

Oct 29, 2024

|

23 min read

Prompt injection attack examples

10 prompt injection attack examples

Oct 28, 2024

|

17 min read

LLM Pentesting: Checklist and Tools

LLM Pentesting: The 2026 Checklist, Methodology, and Tools

Feb 20, 2026

|

9 min read

Data security and Privacy

Data Security and Privacy for AI Systems

Oct 20, 2024

|

14 min read

Protect AI Key Features and Alternatives.

Protect AI Key Features and Alternatives

Sep 10, 2024

|

8 min read

HiddenLayer Best Features and Alternatives

HiddenLayer Key Features and Alternatives

Sep 9, 2024

|

7 min read

Best LLM Red Teaming Platforms

Top 7 LLM Red Teaming Platforms in 2024

Oct 7, 2024

|

8 min read

OWASP top 10 for LLMs part 2

The OWASP Top 10 for Large Language Models Explained for CISOs: Part 2

Sep 20, 2024

|

10 min read

OWASP Top 10 for LLMs for CISO Part 1

The OWASP Top 10 for Large Language Models Explained for CISOs: Part 1

Sep 19, 2024

|

11 min read

How to secure AI Applications

How to Secure Your AI Applications: Essential Strategies for Safety

Sep 18, 2024

|

7 min read

How to secure AI models

Protecting Your AI Models: Simple Strategies for Security

Sep 17, 2024

|

6 min read

Repello tech background with grid pattern symbolizing AI security
Repello AI logo - Footer

Sign up for Repello updates
Subscribe to our newsletter to receive the latest insights on AI security, red teaming research, and product updates in your inbox.

Subscribe to our newsletter

8 The Green, Ste A
Dover, DE 19901, United States of America

Follow us on:

LinkedIn icon
X icon, Twitter icon
Github icon
Youtube icon

© Repello Inc. All rights reserved.

Repello tech background with grid pattern symbolizing AI security
Repello AI logo - Footer

Sign up for Repello updates
Subscribe to our newsletter to receive the latest insights on AI security, red teaming research, and product updates in your inbox.

Subscribe to our newsletter

8 The Green, Ste A
Dover, DE 19901, United States of America

Follow us on:

LinkedIn icon
X icon, Twitter icon
Github icon
Youtube icon

© Repello Inc. All rights reserved.