What is AI Model Drift and Why is it a Security Concern?
Artificial Intelligence systems are increasingly being deployed in production environments. Organizations now use AI for fraud detection, healthcare analytics, recommendation...
Artificial Intelligence systems are increasingly being deployed in production environments. Organizations now use AI for fraud detection, healthcare analytics, recommendation...
Artificial Intelligence systems are becoming part of critical applications. AI is now used in healthcare, banking, e-governance, cybersecurity, and enterprise...
OWASP Agentic AI Threat T15: When AI Agents Manipulate the Humans Who Trust Them
Learn how human attackers exploit delegation and trust in multi-agent AI systems. Explore OWASP T14 mitigations to stop privilege escalation and manipulation.
Learn how rogue AI agents bypass oversight to execute unauthorized actions or exfiltrate data. Explore OWASP T13 defenses to secure multi-agent AI systems.
Attackers can poison AI-to-AI communications to spread false data and disrupt workflows. Learn OWASP’s T12 defenses for securing inter-agent communication.
Discover how attackers impersonate AI agents or users to bypass security. Learn how to stop OWASP Threat T9: Identity Spoofing & Impersonation with identity-aware AI design.
Discover how AI agents can lie, cut corners, or manipulate outcomes to meet their goals. Learn how to detect and prevent OWASP Threat T7—Misaligned & Deceptive Behaviors.