The content discusses various security challenges associated with Large Language Models (LLMs) and emphasizes the OWASP Top 10 framework for identifying vulnerabilities. It offers open-source detection tools and practical implementation tips to enhance LLM security, including regular audits, incident response planning, and ongoing team training, highlighting the importance of adaptability in security measures.
How to monitor and detect malicious PowerShell scripts?
In today's threat landscape more and more threats like fileless malware and ransomware leverage PowerShell during the exploitation stage. In this post I have written some of the best ways to monitor and detect malicious PowerShell scripts. Let's begin with some of the best practices for using PowerShell in your environment Limit PowerShell to only... Continue Reading →
How to protect your organization using Essential Eight mitigation strategy?
Australia Signal Directorate (ASD) and Australia Cyber Security Centre (ACSC) has defined a strategy called Essential Eight to help organizations mitigate threats and adversaries. These eight strategies are baselines and can be used as a starting point for organizations and then strengthen up the defense. In this post, I have explained the eight strategies and... Continue Reading →
Active Directory Password Audit – Using Pwned Passwords
Active directory in Windows have some built in features to set restriction for passwords created in your environment. How cool would it be if we can compare the passwords used in your AD environment with the passwords disclosed in breach database? By doing this you can ensure that none of your users are using weak... Continue Reading →
How to secure your pc from Ransomware?
Ransomware attacks is on all-time high. Every week or month there is a new variant coming out. Cisco says that Ransomware attacks are growing more than 350 percent annually. If you are curious how ransomware spreads, I have answered for 'How does ransomware get on people's computers?' and how to avoid them in information security... Continue Reading →
