Zeev KalyuzhnerinWix EngineeringBypassing Boundaries: 4 Basic Steps for Indirect Prompt Injection in LLMsWelcome to the third article of our series uncovering the vulnerabilities within Large Language Models (LLMs).6d ago6d ago
Zeev KalyuzhnerinWix EngineeringUnderstanding LLM API Exploitation: A 4-Step Tactical GuideWelcome to the second article in our series unveiling the vulnerabilities inherent in Large Language Models (LLMs).May 26May 26
Zeev KalyuzhnerinWix EngineeringExploiting LLMs: Unpacking Excessive Agency in a 6-Step GuideWelcome to the first article in our series about security vulnerabilities in Large Language Models (LLMs).May 16May 16
Zeev KalyuzhnerUnveiling IoT: Harnessing ML for Device Identification through Network Traffic AnalysisAuthors: Frima k. Yablonka, Benayahazan and Zeev KalyuzhnerSep 20, 2023Sep 20, 2023
Zeev KalyuzhnerinWix EngineeringUnveiling LLM Vulnerabilities: 6 Key Risks and How to Stay SecureAs the integration of artificial intelligence (AI) continues to revolutionize industries, it is imperative to address the potential risks…Aug 24, 2023Aug 24, 2023