white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
OWASP Top 10 for Large Language Model Applications

Throughout this article, we will examine how vulnerabilities such as data leakage, unauthorized code execution, inadequate access controls, and more can manifest in the context of LLM applications. We will also explore the specific techniques and attack vectors that malicious actors may employ to exploit LLMs and compromise their security.

By understanding the OWASP Top 10 vulnerabilities and their implications in the context of LLMs, we can take proactive steps to fortify our systems and protect sensitive information, user privacy, and the overall integrity of our applications.

Contents:
LLM01:2023 - Prompt Injections
LLM02:2023 - Data Leakage
LLM03:2023 - Inadequate Sandboxing
LLM04:2023 - Unauthorized Code Execution
LLM05:2023 - SSRF Vulnerabilities
LLM06:2023 - Overreliance on LLM-generated Content
LLM07:2023 - Inadequate AI Alignment
LLM08:2023 - Insufficient Access Controls
LLM09:2023 -g LLM10:2023 - Training Data Poisoning
🔥3👍1
OWASP Top 10 for Large Language Model Applications.pdf
2.2 MB
OWASP Top 10 for Large Language Model Applications PDF
🔥2
CISSP Cheat Sheet

#docs #useful #management
🔥4
CISSP Cheat Sheet.pdf
573.1 KB
CISSP Cheat Sheet

#management
👍2
Forwarded from CyberSecBastion
👍5
Forwarded from CyberSecBastion
60 Methods For Cloud Attacks.pdf
3.2 MB
60 Methods For Cloud Attacks PDF Guide
🔥2
Web Security: Learning HTTP Security Headers, Liran Tal, 2023

18 Lessons, 8 Quizzes, 30 Code Snippets, and 19 Illustrations to help you learn

Takeaway Skills
(+) Secure web applications using HTTP security headers
(+) Understand Content Security Policy
(+) Setup Node.js web applications securely
(+) Learn how to test and monitor for security headers and vulnerable JavaScript libraries
(+) Roadmap for future web controls

For each HTTP security header that can enhance your web application security, you'll learn what is the overall risk of not implementing it, and what does a proposed solution help with. Finally, you'll learn how to implement and configure the security header with Helmet, a popular and well-maintained Node.js package on npm.

#book #web #AppSec
👍51
Web Security Learning HTTP Security Headers (Liran Tal).pdf
5.3 MB
Web Security: Learning HTTP Security Headers, Liran Tal, 2023
🔥7
API Security in Action, Neil Madden, 2020

APIs control data sharing in every service, server, data store, and web client. Modern data-centric designs—including microservices and cloud-native applications—demand a comprehensive, multi-layered approach to security for both private and public-facing APIs.

API Security in Action teaches you how to create secure APIs for any situation. By following this hands-on guide you’ll build a social network API while mastering techniques for flexible multi-user security, cloud key management, and lightweight cryptography. When you’re done, you’ll be able to create APIs that stand up to complex threat models and hostile environments.

What’s inside
• Authentication
• Authorization
• Audit logging
• Rate limiting
• Encryption

#book #AppSec
👍2🔥2
API Security in Action (Neil Madden).pdf
10.4 MB
API Security in Action, Neil Madden, 2020
🔥61