{"id":53244,"date":"2023-08-15T00:00:00","date_gmt":"2023-08-15T00:00:00","guid":{"rendered":"urn:uuid:5485ddf0-5b43-de8a-2ef2-4cf60dd3b39d"},"modified":"2023-08-15T00:00:00","modified_gmt":"2023-08-15T00:00:00","slug":"top-10-ai-security-risks-according-to-owasp","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/top-10-ai-security-risks-according-to-owasp\/","title":{"rendered":"Top 10 AI Security Risks According to OWASP"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/top-ai-risks:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/thumbnails\/23\/top-ai-risks.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>For more than 20 years, the Open Worldwide Application Security Project (OWASP) top 10 risk list has been a go-to reference in the fight to make software more secure. So it\u2019s no surprise developers and cybersecurity professionals paid close attention earlier this spring when OWASP published an all-new list focused on large language model AI vulnerabilities.<\/p>\n<p>OWASP\u2019s move is yet more proof of how quickly AI chatbots have swept into the mainstream. Nearly half (48%) of corporate respondents to <a href=\"https:\/\/www.resumebuilder.com\/1-in-4-companies-have-already-replaced-workers-with-chatgpt\/\" target=\"_blank\" rel=\"noopener\">one survey<\/a> said that by February 2023 they had already <i>replaced workers <\/i>with ChatGPT\u2014just three months after its public launch. With many observers expressing concern that AI adoption has rushed ahead without understanding of the risks involved, the OWASP top 10 AI risk list is both timely and essential.<\/p>\n<p><span class=\"body-subhead-title\">Large language model vulnerabilities at a glance<\/span><\/p>\n<p>OWASP has released two draft versions of its AI vulnerability list so far: one in May 2023 and a July 1 <a href=\"https:\/\/owasp.org\/www-project-top-10-for-large-language-model-applications\/assets\/PDF\/OWASP-Top-10-for-LLMs-2023-v05.pdf\" target=\"_blank\" rel=\"noopener\">update<\/a> with refined classifications and definitions, examples, scenarios, and links to additional references. The most recent is labeled \u2018version 0.5\u2019, and a formal version 1 is reported to be in the works.<\/p>\n<p>We did some analysis and found the vulnerabilities identified by OWASP fall broadly into three categories:<\/p>\n<ol>\n<li><i>Access risks <\/i>associated with exploited privileges and unauthorized actions.<\/li>\n<li><i>Data risks<\/i> such as data manipulation or loss of services.<\/li>\n<li><i>Reputational and business risks<\/i> resulting from bad AI outputs or actions.<\/li>\n<\/ol>\n<p>In this blog, we take a closer look at the specific risks in each case and offer some suggestions about how to handle them.<\/p>\n<p><span class=\"body-subhead-title\">1. Access risks<\/span><\/p>\n<p>Of the 10 vulnerabilities listed by OWASP, four are specific to access and misuse of privileges:<b> insecure plugins, insecure output handling, permissions issues,<\/b> and <b>excessive agency<\/b>.<\/p>\n<p>According to OWASP, any large language model that uses insecure plugins to receive \u201cfree-form text\u201d inputs could be exposed to malicious requests, resulting in unwanted behaviors or the execution of unauthorized remote code. On the flipside, plugins or applications that handle large language model <i>outputs <\/i>insecurely\u2014without evaluating them\u2014could be susceptible to cross-site and server-side request forgeries, unauthorized privilege escalations, hijack attacks, and more.<\/p>\n<p>Similarly, when authorizations aren\u2019t tracked between plugins, permissions issues can arise that open the way for indirect prompt injections or malicious plugin usage.<\/p>\n<p>Finally, because AI chatbots are \u2018actors\u2019 able to make and implement decisions, it matters how much free reign (i.e., agency) they\u2019re given. As OWASP explains, \u201cWhen LLMs interface with other systems, unrestricted agency may lead to undesirable operations and actions.\u201d Examples include personal mail reader assistants being exploited to propagate spam or customer service AI chatbots manipulated into issuing undeserved refunds.<\/p>\n<p>In all of these cases, the large language model becomes a conduit for bad actors to infiltrate systems.<\/p>\n<p><span class=\"body-subhead-title\">2. Data risks<\/span><\/p>\n<p>Poisoned training data, supply chain vulnerabilities, prompt injection vulnerabilities and denials of service<b> <\/b>are all data-specific AI risks.<\/p>\n<p>Data can be poisoned deliberately by bad actors who want to harm an organization. It can also be distorted inadvertently when an AI system learns from unreliable or unvetted sources. Both types of poisoning can occur within an active AI chatbot application or emerge from the large language model supply chain, where reliance on pre-trained models, crowdsourced data, and insecure plugin extensions may produce biased data outputs, security breaches, or system failures.<\/p>\n<p>With prompt injections, ill-meaning inputs may cause a large language model AI chatbot to expose data that should be kept private or perform other actions that lead to data compromises.<\/p>\n<p>AI denial of service attacks are similar to classic DOS attacks. They may aim to overwhelm a large language model and deprive users of access to data and apps, or\u2014because many AI chatbots rely on pay-as-you-go IT infrastructure\u2014force the system to consume excessive resources and rack up massive costs.<\/p>\n<p><span class=\"body-subhead-title\">3. Reputational and business risks<\/span><\/p>\n<p>The final OWASP vulnerability (according to our buckets) is already reaping consequences around the world today:<b> <\/b>overreliance on AI. There\u2019s no shortage of stories about large language models generating false or inappropriate outputs from fabricated citations and <a href=\"https:\/\/www.nytimes.com\/2023\/05\/27\/nyregion\/avianca-airline-lawsuit-chatgpt.html\" target=\"_blank\" rel=\"noopener\">legal precedents<\/a> to <a href=\"https:\/\/www.washingtonpost.com\/technology\/2022\/07\/16\/racist-robots-ai\/\" target=\"_blank\" rel=\"noopener\">racist and sexist<\/a> language.<\/p>\n<p>OWASP points out that depending on AI chatbots without proper oversight can make organizations vulnerable to publishing misinformation or offensive content that results in reputational damage or even legal action.<br \/>Given all these various risks, the question becomes, \u201cWhat can we do about it?\u201d Fortunately, there are some protective steps organizations can take.\u2003<\/p>\n<p><span class=\"body-subhead-title\">What enterprises can do about large language model vulnerabilities<\/span><\/p>\n<p>From our perspective at Trend Micro, defending against AI access risks requires a zero-trust security stance with disciplined separation of systems (sandboxing). Even though generative AI has the ability to challenge zero-trust defenses in ways that other IT systems don\u2019t\u2014because it can mimic trusted entities\u2014a zero-trust posture still adds checks and balances that make it easier to identify and contain unwanted activity. OWASP also advises that large language models \u201cshould not self-police\u201d and calls for controls to be embedded in application programming interfaces (APIs).<\/p>\n<p>Sandboxing is also key to protecting data privacy and integrity: keeping confidential information fully separated from shareable data and making it inaccessible to AI chatbots and other public-facing systems. (See our recent blog on <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/23\/f\/ai-cybersecurity-policy-considerations.html\">AI cybersecurity policies<\/a> for more.)<\/p>\n<p>Good separation of data prevents large language models from including private or personally identifiable information in public outputs, and from being publicly prompted to interact with secure applications such as payment systems in inappropriate ways.<\/p>\n<p>On the reputational front, the simplest remedies are to not rely solely on AI-generated content or code, and to never publish or use AI outputs without first verifying they are true, accurate, and reliable.<\/p>\n<p>Many of these defensive measures can\u2014and should\u2014be embedded in corporate policies. Once an appropriate policy foundation is in place, security technologies such as endpoint detection and response (EDR), <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/k\/threat-detection-response-guide.html\">extended detection and response (XDR)<\/a>, and security information and event management (SIEM) can be used for enforcement and to monitor for potentially harmful activity.<\/p>\n<p><span class=\"body-subhead-title\">Large language model AI chatbots are here to stay<\/span><\/p>\n<p>OWASP\u2019s initial work cataloguing AI risks proves that concerns about the rush to embrace AI are well justified. At the same time, AI clearly isn\u2019t going anywhere, so understanding the risks and taking responsible steps to mitigate them is critically important.<\/p>\n<p>Setting up the right policies to manage AI use and implementing those policies with the help of cybersecurity solutions is a good first step. So is staying informed. The way we see it at Trend Micro, OWASP\u2019s top 10 AI risk list is bound to become as much of an annual must-read as its original application security list has been since 2003.<\/p>\n<p><span class=\"body-subhead-title\">Next steps<\/span><\/p>\n<p>For more Trend Micro thought leadership on AI chatbot security, check out these resources:<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/23\/h\/top-ai-risks.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The unveiling of the first-ever Open Worldwide Application Security Project (OWASP) risk list for large language model AI chatbots was yet another sign of generative AI\u2019s rush into the mainstream\u2014and a crucial step toward protecting enterprises from AI-related threats. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":53245,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9528,9549,9550,9527,9529],"class_list":["post-53244","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-ciso-article","tag-trend-micro-ciso-cloud","tag-trend-micro-ciso-detection-and-response","tag-trend-micro-ciso-expert-perspective","tag-trend-micro-ciso-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top 10 AI Security Risks According to OWASP 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/top-10-ai-security-risks-according-to-owasp\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 10 AI Security Risks According to OWASP 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/top-10-ai-security-risks-according-to-owasp\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-15T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/top-ai-risks:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-10-ai-security-risks-according-to-owasp\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-10-ai-security-risks-according-to-owasp\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Top 10 AI Security Risks According to OWASP\",\"datePublished\":\"2023-08-15T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-10-ai-security-risks-according-to-owasp\\\/\"},\"wordCount\":1121,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-10-ai-security-risks-according-to-owasp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/top-10-ai-security-risks-according-to-owasp.png\",\"keywords\":[\"Trend Micro CISO : Article\",\"Trend Micro CISO : Cloud\",\"Trend Micro CISO : Detection and Response\",\"Trend Micro CISO : Expert Perspective\",\"Trend Micro CISO : Risk Management\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-10-ai-security-risks-according-to-owasp\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-10-ai-security-risks-according-to-owasp\\\/\",\"name\":\"Top 10 AI Security Risks According to OWASP 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-10-ai-security-risks-according-to-owasp\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-10-ai-security-risks-according-to-owasp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/top-10-ai-security-risks-according-to-owasp.png\",\"datePublished\":\"2023-08-15T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-10-ai-security-risks-according-to-owasp\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-10-ai-security-risks-according-to-owasp\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-10-ai-security-risks-according-to-owasp\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/top-10-ai-security-risks-according-to-owasp.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/top-10-ai-security-risks-according-to-owasp.png\",\"width\":976,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-10-ai-security-risks-according-to-owasp\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro CISO : Article\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-ciso-article\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Top 10 AI Security Risks According to OWASP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 10 AI Security Risks According to OWASP 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/top-10-ai-security-risks-according-to-owasp\/","og_locale":"en_US","og_type":"article","og_title":"Top 10 AI Security Risks According to OWASP 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/top-10-ai-security-risks-according-to-owasp\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-08-15T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/top-ai-risks:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/top-10-ai-security-risks-according-to-owasp\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/top-10-ai-security-risks-according-to-owasp\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Top 10 AI Security Risks According to OWASP","datePublished":"2023-08-15T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/top-10-ai-security-risks-according-to-owasp\/"},"wordCount":1121,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/top-10-ai-security-risks-according-to-owasp\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/top-10-ai-security-risks-according-to-owasp.png","keywords":["Trend Micro CISO : Article","Trend Micro CISO : Cloud","Trend Micro CISO : Detection and Response","Trend Micro CISO : Expert Perspective","Trend Micro CISO : Risk Management"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/top-10-ai-security-risks-according-to-owasp\/","url":"https:\/\/www.threatshub.org\/blog\/top-10-ai-security-risks-according-to-owasp\/","name":"Top 10 AI Security Risks According to OWASP 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/top-10-ai-security-risks-according-to-owasp\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/top-10-ai-security-risks-according-to-owasp\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/top-10-ai-security-risks-according-to-owasp.png","datePublished":"2023-08-15T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/top-10-ai-security-risks-according-to-owasp\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/top-10-ai-security-risks-according-to-owasp\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/top-10-ai-security-risks-according-to-owasp\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/top-10-ai-security-risks-according-to-owasp.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/top-10-ai-security-risks-according-to-owasp.png","width":976,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/top-10-ai-security-risks-according-to-owasp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro CISO : Article","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-article\/"},{"@type":"ListItem","position":3,"name":"Top 10 AI Security Risks According to OWASP"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53244"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53244\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/53245"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}