Published inWix Engineering7 Operating System Concepts Every LLM Engineer Should UnderstandLLMs like ChatGPT, Claude, and Gemini might seem like pure AI magic, but under the hood, they behave a lot like an Operating System…May 25A response icon2May 25A response icon2
Published inWix EngineeringDefending Against LLM Attacks: Securing Integration and Mitigating Risks with 5 Essential…Welcome to the final article in our information security and LLMs series, where we conclude our exploration by focusing on defending…Jul 24, 2024Jul 24, 2024
Published inWix EngineeringA 4-Stage Guide to Identify Insecure Output Handling Exploits in LLMsWelcome to the fourth article in our series dedicated to uncovering the vulnerabilities inherent in Large Language Models (LLMs). In our…Jul 15, 2024Jul 15, 2024
Published inWix EngineeringBypassing Boundaries: 4 Basic Steps for Indirect Prompt Injection in LLMsWelcome to the third article of our series uncovering the vulnerabilities within Large Language Models (LLMs).Jul 1, 2024Jul 1, 2024
Published inWix EngineeringUnderstanding LLM API Exploitation: A 4-Step Tactical GuideWelcome to the second article in our series unveiling the vulnerabilities inherent in Large Language Models (LLMs).May 26, 2024May 26, 2024
Published inWix EngineeringExploiting LLMs: Unpacking Excessive Agency in a 6-Step GuideWelcome to the first article in our series about security vulnerabilities in Large Language Models (LLMs).May 16, 2024May 16, 2024
Unveiling IoT: Harnessing ML for Device Identification through Network Traffic AnalysisAuthors: Frima k. Yablonka, Benayahazan and Zeev KalyuzhnerSep 20, 2023Sep 20, 2023
Published inWix EngineeringUnveiling LLM Vulnerabilities: 6 Key Risks and How to Stay SecureAs the integration of artificial intelligence (AI) continues to revolutionize industries, it is imperative to address the potential risks…Aug 24, 2023Aug 24, 2023