Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Abusing AI interfaces: How prompt-level attacks exploit LLM applications

In Parts 1 and 2 of this series, we looked at how attackers get access to and take advantage of the infrastructure and supply chains that shape generative AI applications. In this post, we'll discuss AI interfaces, which we define as the entry points and logic that determine how a user interacts with an AI application. These elements can include chat interfaces, such as AI assistants, and API endpoints for supporting services.

Abusing supply chains: How poisoned models, data, and third-party libraries compromise AI systems

The AI ecosystem is rapidly changing, and with this growth comes unique challenges in securing the infrastructure and services that support it. In Part 1 of this series, we explored how attackers target the underlying resources that host and run AI applications, such as cloud infrastructure and storage. In this post, we'll look at threats that affect AI-specific resources in supply chains, which are the software and data artifacts that determine how an AI service operates.

How Outsourcing and Automation Can Help Australian and New Zealand Organizations Plug the Cybersecurity Skills Gap

Organizations across Australia and New Zealand are increasingly confronted with the challenge of bridging the cybersecurity talent shortage with 69 per cent of ICT professional occupations in shortage, a gap that compounds concern as the complexity of cyberthreats continues to evolve. Faced with a finite talent pool, businesses must find innovative ways to maintain their security posture without sacrificing operational efficiency or increasing strain on their resources.

Exposure Prioritization: Making Smart Decisions with Risk and Business Context

When vulnerability scans return thousands or even millions of findings, leading to an avalanche of tickets to evaluate, the real challenge begins: figuring out what to fix first. Exposure prioritization is the critical next phase of a mature exposure management program. After defining what exposure management is and establishing a normalized foundation of aggregated data, the question becomes: how do we cut through the noise and focus on what truly matters?

Beyond PCI and HIPAA: How Feroot Powers UK Data Protection Act (UK DPA) Compliance

If your website or app collects personal data from users in the United Kingdom, the UK Data Protection Act (UK DPA 2018) likely applies to you. Many businesses assume that GDPR alone covers their data protection obligations, but since Brexit, the UK operates its own version of GDPR, supplemented and enforced through the DPA.

Cybersecurity Frontlines Now Require Organizations to Address APIs as a Matter of Urgency

APIs operate throughout the digital world to support mobile applications, enable cloud capabilities, power GenAI tools, and conduct invisible operations during every digital interaction. As the growth of API usage accelerates, Akamai’s 2024 API Security Impact Report shows that organizations find it difficult to align their security efforts with the expanding risk domain.

Plagued by Cyberattacks: Indian Healthcare Sector in Critical Condition

A recent report states that Indian healthcare institutions face a total of 8,614 cyberattacks every week. That is more than four times the global average and over double the amount faced by any other industry in India. If the feeling was in the air before, the numbers leave no doubt; India’s healthcare sector is an irresistible target for today’s attackers.

A Practical Guide to the European Union's Cybersecurity Funding for SMEs

For any small- to medium-sized enterprise (SME), the cybersecurity landscape can be intimidating. You are informed of a variety of threats, reliable expertise is scarce, and there is limited (if any) budget available. To help with this, the European Union (EU) has funding available to help SME’s improve their cyber defences. But what does this funding actually entail, and how can it practically help your organisation? Let's break it down.