Red Hat Security14 · 2026-03-26 00:00
AI security: Defending against prompt injection and unsafe actions
In previous articles, we framed AI security as protecting confidentiality, integrity, and availability of the whole AI system, not just the model. We also mapped AI risks onto familiar secure development lifecycle (SDLC) thinking, treating data and model artifacts as first-class build inputs and outputs.This article examines the primary security risk for enterprise large language model (LLM) applications: prompt injection. This vulnerability occurs when the model fails to distinguish between ...
Publications | Outflank12 · 2026-03-26 16:29
Introducing Cobalt Strike Research Labs
This is a joint blog written by Stan Hegt, Pieter Ceelen, and Will Burgess. Today, we’re launching Cobalt Strike Research Labs (CS:RL) , a new Fortra offering that unites the research expertise of the Cobalt Strike and Outflank teams. CS:RL delivers cutting-edge, ready-to-use research tooling for Cobalt Strike, including custom UDRLs, Sleep Masks, UDC2 channels, and post-exploitation capabilities. Most importantly, it provides the Cobalt Strike team with a platform to deliver experimental bet...
SitePoint8 · 2026-03-26 19:44
OpenClaw Security Audit: Detecting Malicious AI Agent Plugins in Your Local Stack
A hands-on security guide for developers running OpenClaw AI agents, covering plugin vulnerability scanning, malicious code detection patterns, and hardening strategies for 20-26% malicious plugin rates in the 300K-star ecosystem. Continue reading OpenClaw Security Audit: Detecting Malicious AI Agent Plugins in Your Local Stack on SitePoint .
Sucuri Blog6 · 2026-03-26 19:00
Web Shells: Types, Mitigation & Removal
Web shells are malicious scripts that give attackers persistent access to compromised web servers, enabling them to execute commands and control the server remotely. These scripts exploit vulnerabilities like SQL injection, remote file inclusion (RFI), and cross-site scripting (XSS) to gain entry. Once deployed, web shells allow attackers to manipulate the server, leading to data theft, website defacement, or serving as a launchpad for further attacks. They are especially dangerous because th...
miguelgrinberg.com6 · 2026-03-26 12:30
SQLAlchemy 2 In Practice - Chapter 2 - Database Tables
This is the second chapter of my SQLAlchemy 2 in Practice book. If you'd like to support my work, I encourage you to buy this book, either directly from my store or on Amazon . Thank you! This chapter provides an overview of the most basic usage of the SQLAlchemy library to create, update and query database tables.