Blog · Page 2 of 3
All posts

Zero-Click Calendar Exfiltration Reveals MCP Security Risk in 11.ai
Jul 10, 20256 min read

When the Model Grades the Model: Demystifying ‘LLM-as-a-Judge’ for Practitioners
May 28, 20259 min read

Turning Background Noise into a Prompt Injection Attacks in Voice AI
May 15, 20259 min read

Ghibli Dreams vs. Adversarial Schemes: Attacks on Diffusion Models
May 15, 20259 min read

MCP tool poisoning to RCE
Apr 17, 20259 min read

Securing Machine Learning Models: A Comprehensive Guide to Model Scanning
Apr 4, 20256 min read

Repello AI and LimeChat Join Forces to Make AI Chatbots More Secure
Mar 25, 20254 min read

Distilled, but Dangerous? Assessing the Safety of Models Derived from DeepSeek-R1
Feb 19, 20255 min read

Introducing Matrix AI Security Challenge: An Immersive Cyberpunk Hacking Game
Feb 7, 20253 min read

LLM Evaluation Metrics, Frameworks, and Checklist in 2024
Oct 29, 202423 min read

10 prompt injection attack examples
Oct 28, 202417 min read

Data Security and Privacy for AI Systems
Oct 20, 202414 min read

Top 11 AI Jailbreak Communities to Explore
Sep 21, 20245 min read

The OWASP Top 10 for Large Language Models Explained for CISOs: Part 2
Sep 20, 202410 min read

The OWASP Top 10 for Large Language Models Explained for CISOs: Part 1
Sep 19, 202411 min read

How to Secure Your AI Applications: Essential Strategies for Safety
Sep 18, 20247 min read

Protecting Your AI Models: Simple Strategies for Security
Sep 17, 20246 min read

Top 6 AI Security Vulnerabilities in 2024
Sep 16, 20249 min read