Zeev KalyuzhnerinWix EngineeringDefending Against LLM Attacks: Securing Integration and Mitigating Risks with 5 Essential…Welcome to the final article in our information security and LLMs series, where we conclude our exploration by focusing on defending…Jul 24Jul 24
Zeev KalyuzhnerinWix EngineeringA 4-Stage Guide to Identify Insecure Output Handling Exploits in LLMsWelcome to the fourth article in our series dedicated to uncovering the vulnerabilities inherent in Large Language Models (LLMs). In our…Jul 15Jul 15
Zeev KalyuzhnerinWix EngineeringBypassing Boundaries: 4 Basic Steps for Indirect Prompt Injection in LLMsWelcome to the third article of our series uncovering the vulnerabilities within Large Language Models (LLMs).Jul 1Jul 1
Zeev KalyuzhnerinWix EngineeringUnderstanding LLM API Exploitation: A 4-Step Tactical GuideWelcome to the second article in our series unveiling the vulnerabilities inherent in Large Language Models (LLMs).May 26May 26
Zeev KalyuzhnerinWix EngineeringExploiting LLMs: Unpacking Excessive Agency in a 6-Step GuideWelcome to the first article in our series about security vulnerabilities in Large Language Models (LLMs).May 16May 16
Zeev KalyuzhnerUnveiling IoT: Harnessing ML for Device Identification through Network Traffic AnalysisAuthors: Frima k. Yablonka, Benayahazan and Zeev KalyuzhnerSep 20, 2023Sep 20, 2023
Zeev KalyuzhnerinWix EngineeringUnveiling LLM Vulnerabilities: 6 Key Risks and How to Stay SecureAs the integration of artificial intelligence (AI) continues to revolutionize industries, it is imperative to address the potential risks…Aug 24, 2023Aug 24, 2023