OWASP just released the Top 10 for Agentic Applications 2026 - the first security framework dedicated to autonomous AI agents. We've been tracking threats in this space for over a year. Two of our ...
These aren't simple chatbots anymore—these AI agents access data and tools and carry out tasks, making them infinitely more capable and dangerous. Image: Envato After months of organizations deploying ...
Agentic AI is being adopted fast by enterprises, propelled by an explosion of use cases, but security, as always, is lagging. The OWASP Top 10 for Agentic AI can help close that gap. LLM-powered ...
WILMINGTON, Del. — Dec. 10, 2025 — The OWASP GenAI Security Project on Wednesday unveiled the OWASP Top 10 for Agentic Applications, a new framework designed to help organizations identify and ...
Value stream management involves people in the organization to examine workflows and other processes to ensure they are deriving the maximum value from their efforts while eliminating waste — of ...
OWASP has updated its list of Top 10 software vulnerabilities to align it better with the current threat landscape and modern development practices. The Nov. 6 release is OWASP's first major Top 10 ...
OWASP has added two new categories to the revised version of its Top 10 list of the most critical risks to web applications. The Open Web Application Security Project (OWASP) has released a revised ...
A new vulnerability scoring system has just been announced. The initiative, called the AI Vulnerability Scoring System (AIVSS), aims to fill the gaps left by traditional models such as the Common ...
AI’s moving too fast for old rules — MAESTRO gives banks a smarter, layered way to secure next-gen generative and agentic AI systems. Artificial Intelligence (AI) is advancing at a pace that outstrips ...
Pull requests help you collaborate on code with other people. As pull requests are created, they’ll appear here in a searchable and filterable list. To get started, you should create a pull request.
This is where ethical hacking simulations come in. These platforms will provide a safe, legal environment where you can practice hacking techniques, develop a read on vulnerabilities, and improve ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results