News

OWASP has taken a significant step towards ensuring the security of Large Language Model (LLM) applications. They have recently released a top 10 list of security vulnerabilities specifically ...
The BOM Maturity Model is a subproject of the OWASP Software Component Verification Standard (SCVS), designed for organizations to evaluate and improve their software supply chain assurance.
The OWASP Business Logic Abuse Top 10 aims to close the gap around these types of attacks by enumerating and classifying the different types of business logic abuse.
The Delaware chapter of the Open Web Application Security Project (OWASP) is holding its monthly meeting tonight, and it’s called “Escaping the Sandbox: The Browser Trust Model vs. the Bad Guys.” ...
OWASP’s checklist provides a concise and quick resource to help organizations and security leaders deal with generative AI and LLMs.
The Open Web Application Security Project (OWASP) released the LLM AI Cybersecurity & Governance Checklist. This 32-page document is designed to help organizations create a strategy for implementing ...
The BOM Maturity Model is a subproject of the OWASP Software Component Verification Standard (SCVS), designed for organizations to evaluate and improve their software supply chain assurance.