Building an AI Governance Program: Lessons from the Enterprise - Free Webinar on December 11th, 2025
The OWASP Top 10 Risks for LLMs helps shed light on the top vulnerabilities to AI in today’s landscape. In this blog, we’ll go over LLM09: Misinformation. What it is, how to mitigate it, and more.
In an ecosystem of constantly rising AI threats and attacks, the OWASP LLM Top 10 is here to give guidance on the biggest risks in the landscape and how to combat them. Today’s blog dives into #8: Vector and Embedding Weaknesses.
The OWASP Top Ten Risks for LLMs is a comprehensive list for security researchers to assess vulnerabilities in AI models. Today’s blog will dive in-depth into item 7: System Prompt Leakage.
Agentic AI is introducing new risks to cybersecurity worldwide. The OWASP Top 10 Risks for LLMs breaks down the biggest risks in the landscape. Today’s blog will tackle #LLM06: Excessive Agency.
As AI attacks increase, it is more important than ever to be aware of risks. The OWASP Top 10 Risks for LLMs is a great jumping off point. In this blog, we’ll be deep-diving the 5th item on the list: Improper Output Handling.
In this blog series, we’re breaking down the OWASP Top 10 risks for LLMs and explaining how each one manifests and can be mitigated. Today’s risk is #4 on the list: Data and Model Poisoning. Read on to learn more…
The OWASP Top 10 List of Risks for LLMs helps developers and security teams determine where the biggest risk factors lay. In this blog series from FireTail, we are exploring each risk one by one, how it manifests, and mitigation strategies. This week, we’re focusing on LLM03: Supply Chain vulnerabilities.
OWASP’s Top 10 for LLM is a good starting point for teams to learn about AI security risks. In this series, we’ll go over each risk and practices to protect against them. Today, we’re tackling LLM02: Sensitive Information Disclosure.
In this blog, we are taking a closer look at Prompt Injection, the #1 vulnerability on the OWASP Top 10 list of LLM risks in 2025. Join us in the first of this 10-part series as we examine the root causes of prompt injection, how prompt injection attacks are carried out, and the best methods to avoid them.
By using this website, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.