Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Analyzing llama.cpp Servers for Prompt Leaks

The proliferation of AI has rapidly introduced many new software technologies, each with its own potential misconfigurations that can compromise information security. Thus the mission of UpGuard Research: discover the vectors particular to a new technology and measure its cyber risk. This investigation looks at llama.cpp, an open-source framework for using large language models (LLMs).

CISOs: The Perfect SCORE With Your Board

You’ve done the work—mapped the risks, built the roadmap, secured the right tools. But when it’s time to face the board, the conversation stalls. Not because you’re wrong. Because you’re speaking a different language. Boards don’t operate in threat models and tech stacks. They operate in risk, revenue, and accountability. And if you want their support, you need to meet them there.

Strategies to Mitigate Risks in AI-Driven Medical Note Systems

AI isn't just changing how healthcare works-it's redefining how care is delivered. With medical note systems powered by AI, clinicians are finally getting a break from endless documentation. But with that freedom comes a new set of challenges: accuracy, data safety, and the delicate balance between tech and human judgment. If you're adopting or managing these tools, it's not just about innovation-it's about protecting what matters most. Read on to discover the key strategies every healthcare leader must know to implement AI documentation systems responsibly and effectively.

Threat Monitoring for Superannuation Security

On April 4, 2025, The Australian Financial Review reported on a set of credential abuse attacks targeting multiple Austrian superannuation funds. These attacks were not breaches of the infrastructure of those companies, but compromises of individual customer accounts via stolen credentials. How were those customer credentials stolen?

Third-Party Security Risks: How to Mitigate Potential Cybersecurity Threats

Cooperation is the key to success, and working with third parties helps your organization increase efficiency, offer better products and services, employ highly qualified experts, and cut costs. However, all these benefits come at the price of additional cybersecurity risks. Even minor flaws in your third-party vendor’s security and privacy routines may lead to serious cybersecurity breaches in your organization.

How Research Supports the 2025 Bitsight Rating Algorithm Update

In keeping with Bitsight's ongoing commitment to making its ratings more meaningful and more representative of an ever-changing Cybersecurity landscape, the Ratings Algorithm Update for 2025 is scheduled to go into preview on April 8, 2025. The highlight of RAU 2025 is the incorporation of the Web Application Security(WAS) risk vector into the Bitsight Security Ratings1, and the associated deprecation/removal of Web Application Headers(WAH) risk vector.

Preparing for the Next Big Cyber Threat: Expert Recommendations

Staying ahead of the game is a top concern for security teams as the cyber threat landscape continues to evolve rapidly. Every year seems to bring new technological advances, which also introduce new cybersecurity trends and significant risks. As organizations face these challenges, it’s essential to build proactive defenses, not reactive responses. The next big cyber threat is already here—ready or not.

Ongoing TPRM Success: Continuous Security Monitoring with AI

All security professionals know third-party risk management doesn’t stop after one risk assessment. What about the next vendor? Or the future risks the vendors you’ve already evaluated will inevitably endure? While completing even a single risk assessment can feel like an arduous journey when done manually, all successful TPRM programs continue long after assessment.

Sequenced Event Templates via Risk-based Alerting

Sequenced event templates are pretty cool, but they were developed around the time that Risk-based Alerting (RBA) was developed in Splunk Enterprise Security. Additionally, they don’t have all the great context we can generate with the holistic picture provided by risk, so I want to provide guidance on how we would implement its equivalent in the RBA context as they are now deprecated in Splunk Enterprise Security 8.0. There are two approaches we can utilize that do slightly different things.

Information Security Risk Management (ISRM) Boosts Compliance by Undermining Configuration Drift

Compliance is a “ticket to entry” for businesses today, and information security risk management (ISRM) makes sure organizations hang on to their ticket. In this blog, we’ll review how ISRM helps organizations not only get compliant but stay compliant. And how Tripwire makes that process automatic.