Blog · Page 2 of 3

All posts

Zero-Click Exfiltration: Why "Expected Behavior" in Google’s Antigravity is a Security Crisis

Zero-Click Exfiltration: Why "Expected Behavior" in Google’s Antigravity is a Security Crisis

Nov 28, 202510 min read
Winter is Coming... for Your AI Agents: The Evolving Threat Landscape of Real-World Attacks

Winter is Coming... for Your AI Agents: The Evolving Threat Landscape of Real-World Attacks

Nov 4, 20259 min read
Introducing AI Asset Inventory: See Your AI. Secure Your AI.

Introducing AI Asset Inventory: See Your AI. Secure Your AI.

Oct 31, 20255 min read
Hacktoberfest 2025: Contribute to AI Security with Repello AI!

Hacktoberfest 2025: Contribute to AI Security with Repello AI!

Oct 6, 20253 min read
ChatGPT MCP Connector Security Vulnerability: Zero-Click Data Exfiltration Attack

ChatGPT MCP Connector Security Vulnerability: Zero-Click Data Exfiltration Attack

Sep 24, 202510 min read
Introducing ARTEMIS Browser Mode: Red-Team Your AI Applications Like a Human Would

Introducing ARTEMIS Browser Mode: Red-Team Your AI Applications Like a Human Would

Sep 23, 202510 min read
VANTAGE: A framework for Enterprise AI-SPM built on rigorous AI asset inventorisation

VANTAGE: A framework for Enterprise AI-SPM built on rigorous AI asset inventorisation

Aug 22, 202510 min read
Exploiting Zapier’s Gmail auto-reply agent for data exfiltration

Exploiting Zapier’s Gmail auto-reply agent for data exfiltration

Jul 24, 20256 min read
Security threats in Agentic AI Browsers

Security threats in Agentic AI Browsers

Jul 15, 20256 min read
Zero-Click Calendar Exfiltration Reveals MCP Security Risk in 11.ai

Zero-Click Calendar Exfiltration Reveals MCP Security Risk in 11.ai

Jul 10, 20256 min read
When the Model Grades the Model: Demystifying ‘LLM-as-a-Judge’ for Practitioners

When the Model Grades the Model: Demystifying ‘LLM-as-a-Judge’ for Practitioners

May 28, 20259 min read
Turning Background Noise into a Prompt Injection Attacks in Voice AI

Turning Background Noise into a Prompt Injection Attacks in Voice AI

May 15, 20259 min read
Ghibli Dreams vs. Adversarial Schemes: Attacks on Diffusion Models

Ghibli Dreams vs. Adversarial Schemes: Attacks on Diffusion Models

May 15, 20259 min read
MCP tool poisoning to RCE

MCP tool poisoning to RCE

Apr 17, 20259 min read
Securing Machine Learning Models: A Comprehensive Guide to Model Scanning

Securing Machine Learning Models: A Comprehensive Guide to Model Scanning

Apr 4, 20256 min read
Repello AI and LimeChat Join Forces to Make AI Chatbots More Secure

Repello AI and LimeChat Join Forces to Make AI Chatbots More Secure

Mar 25, 20254 min read
Distilled, but Dangerous? Assessing the Safety of Models Derived from DeepSeek-R1

Distilled, but Dangerous? Assessing the Safety of Models Derived from DeepSeek-R1

Feb 19, 20255 min read
Introducing Matrix AI Security Challenge: An Immersive Cyberpunk Hacking Game

Introducing Matrix AI Security Challenge: An Immersive Cyberpunk Hacking Game

Feb 7, 20253 min read