
Security Insights Blog

AI Security
Read more →

Application Security
Drowning in Security Alerts? OX Security Says You're Focusing on the Wrong 98%
Read more →

AI Security
Living off AI POC Attack: Exploiting MCP Integrations Through Prompt Injection
Read more →

AI Security
Securing LLMs: Why Traditional AppSec Approaches Don't Work
Read more →

AI Security
Securing Your LLM Supply Chain: From Models to Dependencies
Read more →

AI Security
The Dual LLM Pattern for LLM Agents
Read more →

AI Security
The Context-Minimisation Pattern for LLM Agents
Read more →

AI Security
The Plan-Then-Execute Pattern for LLM Agents
Read more →

AI Security
The LLM Map-Reduce Pattern for LLM Agents
Read more →

AI Security
The Code-Then-Execute Pattern for LLM Agents
Read more →

AI Security
The Action-Selector Pattern for LLM Agents
Read more →

AI
Prompt Injection 101 - Risks and Defences
Read more →

AI
LLM Jailbreaking Explained: Attack Methods, Real Risks, and Defences
Read more →

AI
Shadow AI: Is Your Company Data at Risk?
Read more →

Security Insights
Security Insights: Insider Threats, Multi‑Actor Campaigns and the Race to Mitigate
Read more →

Security Insights
Security Insights: Identity Evolved, Supply Chain Risks & Active Exploits
Read more →

Security Insights
Security Insights: Zero-Days, APTs and AI Risks
Read more →

Cybersecurity
Insider Threats Are Evolving: Is Your Threat Model?
Read more →

AI Security
LlamaFirewall: AI Agent Open-Source Guardrail System
Read more →

Cybersecurity
Insights from Mandiant M-Trends 2025 Threat Report
Read more →

AI Security
Hands-On with the Agent Development Kit (ADK): A Security Triage PoC
Read more →

Cybersecurity
Zero Trust Maturity Model: Assessing Identity Maturity
Read more →

Cybersecurity
Zero Trust: What It Is and Why It Matters
Read more →

AI Security
The AI Security Balance: Criminal Exploitation vs. Defensive Innovation
Read more →

Cloud Security
Automating Cloud Compliance Checks with Best Practices in AWS, Azure and GCP
Read more →

Threat Modeling
Threat Modeling with Attack Trees
Read more →

Cybersecurity
Actionable Defences Against AI-Powered Phishing
Read more →

Threat Modeling
Threat Modeling's Blind Spots: Navigating the Complexities of Scope Definition
Read more →

AI Security
MCP Security 101: Exploring AIs Universal Connector
Read more →