ADMIN

54 Results / Page 1 of 6

todayAugust 28, 2025

  • 69
close

Article + MCP Security ADMIN

Security Risks of the Model Context Protocol: Can Autonomous Agents Handle Adversarial Testing? Conversation with ChatGPT, Claude, Grok & Deepseek

As AI systems evolve from passive responders to autonomous agents equipped with planning, memory, and tool use, the Model Context Protocol (MCP) becomes a central architectural layer — and a new security frontier. Yet traditional red teaming approaches are ill-equipped to test how MCP-enabled agents interact, delegate, and reason across ...

todayAugust 25, 2025

  • 200
  • 1
close

Secure AI Weekly ADMIN

Towards Secure AI Week 33 — Lenovo Chatbot Breach, PROMISQROUTE in GPT-5, NIST AI Security Overlays, EU AI Priorities, and Grok Privacy Leak

From Lenovo’s chatbot breach exposing session cookies to our own research uncovering PROMISQROUTE, a novel vulnerability in GPT-5’s routing mechanism found by Adversa AI Research team, this week showed how fragile AI security architectures still are. The risks are not limited to technical flaws: regulators are struggling too, as NIST ...

todayAugust 22, 2025

  • 708
close

Article + GenAI Security ADMIN

Lenovo AI Chatbot Incident: Critical XSS Vulnerability Exposes Enterprise AI Security Gaps

In August 2025, Lenovo quietly patched a critical vulnerability in its AI chatbot “Lena” that could have allowed attackers to steal session cookies and potentially compromise customer support systems through a single 400-character prompt—highlighting a new class of AI-driven security threats that most organizations are unprepared to defend against. The ...

todayAugust 21, 2025

  • 256
close

Article + GenAI Security ADMIN

What Can Generative AI Red Teaming Learn from Cyber Red Teaming — Top Insights

The rapid deployment of generative AI systems across critical infrastructure has created an unprecedented security challenge: how do we effectively test and secure systems that can generate content, make decisions, and interact with users in ways we never fully anticipated — even with AI Red Teaming in place? A groundbreaking ...

todayAugust 20, 2025

  • 669
close

GenAI Security + GenAI Security Digest ADMIN

Top GenAI Security Resources — August 2025

Explore the Top GenAI Resources to stay informed about the most pressing risks and defenses in the field. As GenAI becomes deeply integrated into products, workflows, and user-facing systems, attackers are actively exploiting its vulnerabilities. Prompt injections, jailbreaks, unsafe output handling, and compromised integrations are exposing critical gaps in security. ...

todayAugust 18, 2025

  • 214
close

Secure AI Weekly ADMIN

Towards Secure AI Week 32 — NIST Control Overlays, OWASP Landscape, LLM Trustworthiness Scores, and GPT-5 Jailbreak

From GPT-5 jailbreaks leaking harmful instructions within hours of release to new benchmarks exposing systemic weaknesses in major models, this week highlighted how fragile LLM Security remains. Despite new training methods, Jailbreak LLM attacks like context poisoning and obfuscation continue to bypass guardrails. As enterprises experiment with tool-using and multi-agent ...

todayAugust 11, 2025

  • 292
close

Agentic AI Security Digest ADMIN

Top Agentic AI Security Resources — August 2025

Explore the Top Agentic AI Resources to stay informed about the most pressing risks and defenses in the field. As autonomous agents gain new capabilities—reasoning, memory, tool use—they also introduce unique security challenges. This collection covers the latest research, real-world exploits, and AI red teaming strategies exposing how Agentic AI ...

todayAugust 11, 2025

  • 149
close

Secure AI Weekly ADMIN

Towards Secure AI Week 31 — Gemini Smart Home Hijack, LLM Slopsquatting, GPT-5 Jailbreak, OWASP Landscape, and GenAI Data Exposure

From poisoned calendar invites that let attackers open smart shutters to hallucinated software packages seeding malware into supply chains, this week’s AI security stories highlight just how many doors are left open in generative and agentic systems. Research at Black Hat USA showed that even seemingly routine integrations — like ...