Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
aisecurity
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Securing AI Agent Interactions: Why Cryptographic Identity with DIDs and VCs is a Game Changer
Alessandro Pignati
Alessandro Pignati
Alessandro Pignati
Follow
May 8
Securing AI Agent Interactions: Why Cryptographic Identity with DIDs and VCs is a Game Changer
#
ai
#
cybersecurity
#
aisecurity
#
machinelearning
5
 reactions
Comments
Add Comment
7 min read
CVE-2024-3400 and the AI Security Crisis: Palo Alto's CEO Warned Us While His Own Firewalls Burned [2026]
Kunal
Kunal
Kunal
Follow
May 6
CVE-2024-3400 and the AI Security Crisis: Palo Alto's CEO Warned Us While His Own Firewalls Burned [2026]
#
paloaltonetworks
#
aisecurity
#
zeroday
#
panos
Comments
Add Comment
7 min read
How a Morse Code Message Hacked Grok: Lessons in AI Security for Developers
Alessandro Pignati
Alessandro Pignati
Alessandro Pignati
Follow
May 8
How a Morse Code Message Hacked Grok: Lessons in AI Security for Developers
#
ai
#
machinelearning
#
cybersecurity
#
aisecurity
5
 reactions
Comments
Add Comment
5 min read
The Real Difference Between Azure OpenAI and the Standard API
Pratik Pathak
Pratik Pathak
Pratik Pathak
Follow
Apr 24
The Real Difference Between Azure OpenAI and the Standard API
#
azure
#
aicompliance
#
aisecurity
#
apimanagement
Comments
Add Comment
4 min read
AI security is now a token-burning contest. Who's watching the bill?
Patrick Hughes
Patrick Hughes
Patrick Hughes
Follow
Apr 22
AI security is now a token-burning contest. Who's watching the bill?
#
aisecurity
#
aicosts
#
simonwillison
#
agentguard
Comments
Add Comment
3 min read
Why McDonald’s AI Started Coding: A Wake-Up Call for Chatbot Security
Alessandro Pignati
Alessandro Pignati
Alessandro Pignati
Follow
Apr 22
Why McDonald’s AI Started Coding: A Wake-Up Call for Chatbot Security
#
ai
#
cybersecurity
#
machinelearning
#
aisecurity
5
 reactions
Comments
Add Comment
3 min read
How an AI Agent "Escaped" Its Sandbox Without Breaking a Single Rule
Alessandro Pignati
Alessandro Pignati
Alessandro Pignati
Follow
Apr 21
How an AI Agent "Escaped" Its Sandbox Without Breaking a Single Rule
#
ai
#
machinelearning
#
cybersecurity
#
aisecurity
6
 reactions
Comments
Add Comment
3 min read
Hardening a free public AI tool against prompt injection in 2 hours
Giovanni Sizino Ennes
Giovanni Sizino Ennes
Giovanni Sizino Ennes
Follow
May 4
Hardening a free public AI tool against prompt injection in 2 hours
#
founderjournal
#
aisecurity
#
promptinjection
#
engineering
1
 reaction
Comments
Add Comment
6 min read
GPT-5.4-Cyber: OpenAI's Game-Changer for AI Security and Defensive AI
Alessandro Pignati
Alessandro Pignati
Alessandro Pignati
Follow
Apr 20
GPT-5.4-Cyber: OpenAI's Game-Changer for AI Security and Defensive AI
#
ai
#
machinelearning
#
cybersecurity
#
aisecurity
5
 reactions
Comments
Add Comment
5 min read
Building Secure APIs for AI Systems: Architecture, Threat Models, and Best Practices
Vishal Uttam Mane
Vishal Uttam Mane
Vishal Uttam Mane
Follow
Apr 18
Building Secure APIs for AI Systems: Architecture, Threat Models, and Best Practices
#
aisecurity
#
machinelearning
#
dataprivacy
#
oauth
1
 reaction
Comments
1
 comment
3 min read
Decoding AI Agent Traps: A Developer's Guide to Securing Your Autonomous Systems
Alessandro Pignati
Alessandro Pignati
Alessandro Pignati
Follow
Apr 14
Decoding AI Agent Traps: A Developer's Guide to Securing Your Autonomous Systems
#
ai
#
cybersecurity
#
machinelearning
#
aisecurity
5
 reactions
Comments
Add Comment
5 min read
Stop LLM Hallucinations: Best-of-N vs. Consensus Mechanisms
Alessandro Pignati
Alessandro Pignati
Alessandro Pignati
Follow
Apr 14
Stop LLM Hallucinations: Best-of-N vs. Consensus Mechanisms
#
ai
#
cybersecurity
#
machinelearning
#
aisecurity
5
 reactions
Comments
Add Comment
3 min read
Building Secure AI Systems from Design to Deployment
Vishal Uttam Mane
Vishal Uttam Mane
Vishal Uttam Mane
Follow
Apr 13
Building Secure AI Systems from Design to Deployment
#
aisecurity
#
machinelearningsecurity
#
cybersecurity
#
mlops
1
 reaction
Comments
1
 comment
2 min read
Intel TDX for AI Workloads: I Benchmarked Encrypted vs Regular Inference
VoltageGPU
VoltageGPU
VoltageGPU
Follow
Apr 14
Intel TDX for AI Workloads: I Benchmarked Encrypted vs Regular Inference
#
inteltdx
#
confidentialcomputing
#
aisecurity
#
gpubenchmarks
1
 reaction
Comments
Add Comment
2 min read
Stop Paying the "Latency Tax": A Developer's Guide to Prompt Caching
Alessandro Pignati
Alessandro Pignati
Alessandro Pignati
Follow
Apr 7
Stop Paying the "Latency Tax": A Developer's Guide to Prompt Caching
#
ai
#
cybersecurity
#
machinelearning
#
aisecurity
5
 reactions
Comments
Add Comment
4 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account