<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Prompt attacks against AI Models with links in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Prompt-attacks-against-AI-Models-with-links/m-p/83020#M7608</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;One of my colleagues asked me to provide an explanation of Prompt attacks against AI Models during 2024 and 2025.&amp;nbsp; &amp;nbsp;Here is the result by using AI to assist me.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Note, most organisations believe that paying for the Enterprise AI model protects them, but without the appropriate AI strategy and controls, information will still be leaked via BYOD or by humans bypassing corporate controls.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Regards&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Caute_cautim&lt;/P&gt;</description>
    <pubDate>Wed, 13 Aug 2025 00:09:05 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2025-08-13T00:09:05Z</dc:date>
    <item>
      <title>Prompt attacks against AI Models with links</title>
      <link>https://community.isc2.org/t5/Industry-News/Prompt-attacks-against-AI-Models-with-links/m-p/83020#M7608</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;One of my colleagues asked me to provide an explanation of Prompt attacks against AI Models during 2024 and 2025.&amp;nbsp; &amp;nbsp;Here is the result by using AI to assist me.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Note, most organisations believe that paying for the Enterprise AI model protects them, but without the appropriate AI strategy and controls, information will still be leaked via BYOD or by humans bypassing corporate controls.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Regards&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2025 00:09:05 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Prompt-attacks-against-AI-Models-with-links/m-p/83020#M7608</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2025-08-13T00:09:05Z</dc:date>
    </item>
  </channel>
</rss>

