user

2016-Philippines-NTC-Cyber Security Training

Philippines NTC  is an attached agency of the Department of Information and Communication Technology, responsible for the supervision, adjudication and control over all telecommunications services throughout the country.

2015-EU Moldova-National Cyber Security Consulting

The Ministry of Information Technology and Communication (MITC) is a central specialized public administration body which elaborates and ensures the development of the Informational Society Statute (telecommunication, post, TV and broadcasts).

WiKi Security in TAS(Transform Africa Summit) 2018

WiKi Security Corporation, which participated in TAS(Transform Africa Summit) 2018, the largest ICT event in Africa, as an exhibitor, introduced information security consulting, security products and Training Center for cyber security.In particular, we participated in an official event to deliver certificates on behalf of ISO council as a result of ISO / IEC 27001 consulting service

2023-Rwanda / Participation in the CyberTech Africa Conference held in Kigali, Rwanda

The CyberTech Africa Conference is an important cybersecurity and information technology event held annually in Africa. It brings together cybersecurity experts, IT and security solution providers, government officials and policymakers, business leaders and corporate representatives, and academic researchers from across Africa to discuss the latest technologies, trends, and challenges. WikiSecurity Co. Ltd. has maintained continuous

Summary Explanation of the OWASP Top 10 for LLM Applications for Securing LLM (GenAI, Generative AI) Applications

OWASP Top 10 for LLM Application LLM01. Prompt InjectionMalicious users may manipulate the LLM (GenAI) to redefine system prompts or induce unintended actions through external inputs, leading to data leakage or social engineering attacks. LLM02. Insecure Output HandlingIf the outputs generated by the LLM (GenAI) are not properly validated, vulnerabilities such as XSS, CSRF, or

Security risks and security considerations in building a Retrieval-Augmented Generation (RAG) system

Overview of RAG RAG (Retrieval-Augmented Generation) has become an essential component, alongside PEFT, in the development of GenAI (Large Language Model) systems. It is a technology designed to overcome the inherent limitations of standard LLM architectures. RAG enhances a model’s ability to provide accurate and contextually relevant answers by retrieving and referencing external documents during

Vulnerabilities of OpenAI ChatGPT, a Leading GenAI (Current Zero-day)

Recently, many domestic financial companies have been building GenAI (Generative AI, LLM) systems. However, discussions on LLM security vulnerabilities have been limited to the risk of personal information leakage, while various information security considerations defined in the OWASP Top 10 for LLM Applications have not been taken into account. 1. Vulnerability Test This vulnerability maps