OWASP just released the Top 10 for Agentic Applications 2026 - the first security framework dedicated to autonomous AI agents. We've been tracking threats in this space for over a year. Two of our ...
These aren't simple chatbots anymore—these AI agents access data and tools and carry out tasks, making them infinitely more capable and dangerous. Image: Envato After months of organizations deploying ...
OWASP has updated its list of Top 10 software vulnerabilities to align it better with the current threat landscape and modern development practices. The Nov. 6 release is OWASP's first major Top 10 ...
Abstract: In the current digital environment, web application security is essential due to the substantial risks posed by injection attacks like SQL injection and cross-site scripting (XSS). This ...
The Open Worldwide Application Security Project (OWASP) has earned a reputation as a trusted authority in application security. Its most widely recognised contribution, the OWASP Top 10, serves as a ...
The cybersecurity landscape is shifting beneath our feet. While organizations have spent years in trying to perfect their approach to human identity management, a new challenge has emerged: the ...
There are some very good reasons why non-human identities (NHI) have landed among the most-discussed cybersecurity topics in the last few years — it’s estimated that for every 1,000 human users in an ...
Sensitive information disclosure via large language models (LLMs) and generative AI has become a more critical risk as AI adoption surges, according to the Open Worldwide Application Security Project ...
Apache Commons IO provides a set of utilities for working with the file system that can be helpful in preventing path traversal vulnerabilities. The FilenameUtils class contains methods for ...
Chief information security officers now have a new tool at their disposal to get started with AI securely. The Open Web Application Security Project (OWASP) released the LLM AI Cybersecurity & ...
Web applications often handle vast amounts of data, from personal user details to sensitive corporate information. As these applications grow in complexity and importance, they also become primary ...