Secure AI Weekly

235 Results / Page 2 of 27

todayMarch 4, 2025

  • 89
close

Secure AI Weekly + Trusted AI Blog admin

Towards Secure AI Week 8 – Massive AI security breach

MITRE Releases OCCULT Framework to Address AI Security Challenges GBHackers, February 26, 2025 MITRE has launched the Offensive Cyber Capability Unified LLM Testing (OCCULT) framework, a structured approach designed to assess the potential security risks of large language models (LLMs) in cyberattacks. This initiative focuses on evaluating AI systems’ ability ...

todayFebruary 25, 2025

  • 124
close

Secure AI Weekly + Trusted AI Blog admin

Towards Secure AI Week 7 – OWASP for Agentic AI and more

Agentic AI – Threats and Mitigations OWASP, February 17, 2025 Agentic AI, driven by large language models (LLMs) and generative AI, is advancing rapidly, offering new capabilities while introducing significant security risks. These autonomous systems can plan, adapt, and interact with external environments, making them powerful but also susceptible to ...

todayFebruary 17, 2025

  • 70
close

Secure AI Weekly + Trusted AI Blog admin

Towards Secure AI Week 6 – New AI Security Framework

Announcing the Databricks AI Security Framework 2.0 DataBricks, February 12, 2025 Databricks has unveiled the second edition of its AI Security Framework (DASF 2.0), a comprehensive guide designed to address the growing risks associated with AI deployments. The framework identifies 62 technical AI risks and introduces 64 mitigation controls, offering ...

todayFebruary 12, 2025

  • 79
close

Secure AI Weekly + Trusted AI Blog admin

Towards Secure AI Week 5 – Worldwide AI safety report

World-leading AI cyber security standard to protect digital economy and deliver Plan for Change Gov UK, January 31, 2025 The UK government has unveiled a pioneering cybersecurity standard aimed at protecting artificial intelligence (AI) systems from cyber threats, reinforcing the security of the digital economy. This initiative seeks to ensure ...

todayFebruary 5, 2025

  • 73
close

Secure AI Weekly + Trusted AI Blog admin

Towards Secure AI Week 4 – DeepSeek’s AI Security Failures

Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History Wiz, January 29, 2025 A recent security lapse in AI infrastructure has underscored the critical need for stronger protections in artificial intelligence systems. Wiz Research uncovered an unprotected ClickHouse database belonging to DeepSeek, a Chinese AI startup known ...

todayJanuary 31, 2025

  • 87
close

Secure AI Weekly + Trusted AI Blog admin

Towards Secure AI Week 3 – OWASP Guidelines and Risk Reduction Strategies

AI Security Among Top Priorities for Cybersecurity Leaders Channel Futures, January 24, 2025 A recent report from Info-Tech Research Group outlines key security priorities necessary to mitigate emerging risks while harnessing AI’s potential for strengthening cybersecurity defenses. These priorities include establishing AI governance frameworks to manage security and privacy risks, ...

todayDecember 4, 2024

  • 70
close

Secure AI Weekly + Trusted AI Blog admin

Towards Secure AI Week 48 – Biggest AI Security Bug Bounty

Artificial Intelligence Vulnerability Scoring System (AIVSS) GitHub The AI Vulnerability Scoring System (AIVSS) has been proposed as a framework designed to evaluate vulnerabilities in AI systems comprehensively. Unlike static models, AIVSS incorporates dynamic metrics tailored to AI, including model robustness, data sensitivity, ethical impact, and adaptability, alongside traditional security considerations. ...

todayNovember 18, 2024

  • 78
close

Secure AI Weekly + Trusted AI Blog admin

Towards Secure AI Week 46 – Hacking LLM Robots

It’s Surprisingly Easy to Jailbreak LLM-Driven Robots Researchers induced bots to ignore their safeguards without exception IEEE Spectrum, November 11, 2024 The rapid integration of large language models (LLMs) like ChatGPT into robotics has revolutionized how robots interact with humans, offering capabilities such as voice-activated commands and task execution based ...