LLM Hacking
81 articles
LLM08 Vector Embedding Weaknesses — RAG Attack Guide | AI LLM Hacking Course Day 12
Master LLM08 Vector and Embedding Weaknesses in 2026. RAG poisoning, embedding manipulation, retrieval hijacking and cross-user data exposure. Complete Day…
Non-Human Identity Security — How AI Agents Are Breaking IAM
Non-human identity security 2026. How AI agents create IAM challenges traditional identity management wasn't built for, Gartner's guidance, and what…
LLM07 System Prompt Leakage — 15 Extraction Techniques Every AI Red Teamer Needs | Day 11
Master LLM07 System Prompt Leakage in 2026. 15 extraction techniques — direct requests, translation tricks, roleplay framing, token completion and…
LLM06 Excessive Agency — Hijacking AI Agents to Take Real-World Actions | AI LLM Hacking Course Day 10
Master LLM06 Excessive Agency in 2026. AI agent hijacking, tool abuse, principle of least privilege for LLMs and real-world action…
Shadow AI Security Risks — Biggest Worry for IT Industry
Shadow AI Security Risk 2026. Why 57% of employees use personal GenAI for work, the real security risks, how to…
Google SAIF — The Secure AI Framework Every Security Team Needs
Google SAIF (Secure AI Framework) explained for 2026. The 6 core principles, how to apply SAIF to your AI deployment,…
How Hackers Attack AI Agents — The Complete Threat Model
How hackers attack AI agents in 2026. Prompt injection, tool exploitation, supply chain attacks, autonomous attack agents, and the defences…
PROMPTFLUX and PROMPTSTEAL explained — AI Malware That Queries LLMs Mid-Attack
PROMPTFLUX and PROMPTSTEAL explained — the AI malware families that query LLMs mid-execution to evade detection, documented in M-Trends 2026,…
Agentic AI Security Risks — The Attack Surface Every Organisation Needs to Understand
Agentic AI security risks 2026. How autonomous AI agents create new attack surfaces, real breaches, the CyberStrikeAI case, and how…