Attack Vector Blog Resources Knowledge Repository Research

OWASP Top 10

The Open Web Application Security Project (OWASP) is a prominent, non-profit international organization dedicated to enhancing the security of web applications. One of OWASP’s foundational beliefs is in making their resources readily available for free on their website.

10 Steps to Cyber Resilience

10 Steps to Cyber Resilience

One of the primary challenges organisations face is ensuring robust cyber security. With cyber threats becoming increasingly intricate and persistent, a proactive and well-informed approach to defense is paramount. The UK's National Cyber Security Centre (NCSC)...

read more
OWASP Top 10

OWASP Top 10

The Open Web Application Security Project (OWASP) is a prominent, non-profit international organization dedicated to enhancing the security of web applications. One of OWASP’s foundational beliefs is in making their resources readily available for free on their website.

read more
Exploring Penetration Testing in NHS DTAC

Exploring Penetration Testing in NHS DTAC

Penetration testing (also known as pen testing or ethical hacking) is a cornerstone of the Digital Technology Assessment Criteria (DTAC). By simulating cyberattacks, pen testing exposes vulnerabilities in digital health technologies before malicious actors can exploit...

read more

A Comprehensive Guide to LLM Security

Large Language Models (LLMs) have rapidly become essential tools in various sectors, from content generation to decision support. However, their increasing utility and complexity bring forth a slew of security and ethical concerns.

OWASP Top 10 For LLM (Large Language Model)

The surge in popularity of Large Language Models (LLMs) after the widespread introduction of pre-trained chatbots in late 2022 has been astonishing. Companies, keen to leverage the capabilities of LLMs, are swiftly incorporating them into their systems and customer-oriented services.

MITRE ATLAS

MITRE ATLAS

MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) is a critical resource for anyone involved in the development, deployment, or security of artificial intelligence (AI) systems. It provides a detailed knowledge base of tactics, techniques,...

read more
LLM AI Security & Governance Checklist

LLM AI Security & Governance Checklist

Introduction The rapid rise of powerful generative artificial intelligence (GenAI) applications is poised to impact internet users and businesses significantly. While offering immense potential for discovery, efficiency, and corporate growth across various industries,...

read more
Enterprise Risks with ChatGPT

Enterprise Risks with ChatGPT

Artificial intelligence, particularly advancements in natural language processing (NLP), has truly transformed the business landscape. Tools like ChatGPT offer companies the means to automate customer service, craft content, and even design bespoke user experiences....

read more
A Comprehensive Guide to LLM Security

A Comprehensive Guide to LLM Security

Large Language Models (LLMs) have rapidly become essential tools in various sectors, from content generation to decision support. However, their increasing utility and complexity bring forth a slew of security and ethical concerns.

read more
OWASP Top 10 For LLM (Large Language Model)

OWASP Top 10 For LLM (Large Language Model)

The surge in popularity of Large Language Models (LLMs) after the widespread introduction of pre-trained chatbots in late 2022 has been astonishing. Companies, keen to leverage the capabilities of LLMs, are swiftly incorporating them into their systems and customer-oriented services.

read more
Cheat Sheet Series – Web Service Security

Cheat Sheet Series – Web Service Security

Web Service Security (often abbreviated as WS-Security) refers to a suite of protocols and standards that ensure the protection and security of web services. The cheat sheet below condenses insights extracted from the OWASP article about web service security. This...

read more
Cheat Sheet Series – Credential Stuffing

Cheat Sheet Series – Credential Stuffing

The cheat sheet below condenses insights extracted from the OWASP article about credential stuffing prevention. This table aims to offer a concise and user-friendly overview that can be swiftly referenced for a quick grasp of key points. For further information,...

read more
Cheat Sheet Series – Authentication

Cheat Sheet Series – Authentication

The cheat sheet below condenses insights extracted from the OWASP article about security best practices for authentication. This table aims to offer a concise and user-friendly overview that can be swiftly referenced for a quick grasp of key points. For further...

read more
Cheat Sheet Series – Input Validation 

Cheat Sheet Series – Input Validation 

The cheat sheet below condenses insights extracted from the OWASP article about user input validation. This table aims to offer a concise and user-friendly overview that can be swiftly referenced for a quick grasp of key points. For further information, please visit...

read more