Virtual patching protects applications from vulnerabilities without changing the source code. Learn how it works, its role in preventing exploits, and how WAFs apply real-time fixes.
LLM01:2025 Prompt Injection is a technique used to manipulate AI models by inserting malicious inputs to alter their behavior. This video explains how it works, real-world risks, and how to defend against it. Stay informed and secure!
Discover the best AWS alternatives for Web Application Firewall (WAF). This video compares key features, pricing, and performance to help you choose the ideal WAF solution for your needs. For more insights on website and API security fundamentals, subscribe to our newsletter.
Discover the best Akamai alternatives for Web Application Firewall (WAF). This video compares key features, pricing, and performance to help you choose the ideal WAF solution for your needs.
The release of the OWASP Top 10 for LLM Applications 2025 provides a comprehensive overview of the evolving security challenges in the world of Large Language Models (LLMs). With advancements in AI, the adoption of LLMs like GPT-4, LaMDA, and PaLM has grown, but so have the risks. The new 2025 list builds upon the foundational threats outlined in previous years, reflecting the changing landscape of LLM security.
A new and growing threat has emerged, targeting vulnerable PHP servers with a sophisticated cryptocurrency mining attack. This exploit takes advantage of misconfigured or unpatched PHP servers, allowing malicious actors to gain unauthorized access and deploy mining malware. The campaign focuses on exploiting vulnerabilities in PHP, particularly CVE-2024-4577, which has already been linked to several exploit attempts and continues to affect systems worldwide.
An XXE (XML External Entity) attack is a security vulnerability where attackers exploit improperly configured XML parsers to access sensitive data, execute code, or perform denial-of-service attacks. Learn about XML External Entity (XXE) attacks, how attackers exploit XML parsers to access sensitive data or execute malicious code, and ways to prevent them.