AI Security Attack Techniques
Comprehensive database of attack techniques, tactics, and procedures targeting AI systems. Explore vulnerabilities across LLMs, GenAI, Agentic AI, and MCP implementations.
10
Total Attacks
2
Critical Severity
6
High Severity
4
Categories
Attack Categories
🤖
LLM Attacks
3 attack techniques
Large Language Model vulnerabilities including prompt injection, jailbreaking, and model manipulation techniques.
1 Critical2 High
🎨
GenAI Threats
3 attack techniques
Generative AI misuse including deepfakes, synthetic identity creation, and voice cloning attacks.
2 High
🤖
Agentic AI Attacks
2 attack techniques
Advanced threats from autonomous AI agents capable of independent exploitation and tool manipulation.
1 Critical1 High
🔗
MCP Security
2 attack techniques
Model Context Protocol vulnerabilities including server impersonation and context poisoning.
1 High
Featured Attack Techniques
Prompt Injection
CriticalLow Complexity
Critical vulnerability where malicious prompts manipulate LLM behavior to bypass safety measures.
Primary Impact:
Data ExfiltrationUnauthorized AccessSystem Manipulation
Autonomous Exploitation
CriticalHigh Complexity
AI agents that independently discover and exploit system vulnerabilities without human intervention.
Primary Impact:
System CompromiseLateral MovementData Breach
Deepfake Generation
HighMedium Complexity
Creation of synthetic media content using generative AI to impersonate individuals.
Primary Impact:
Identity TheftMisinformationSocial Engineering
Stay Ahead of AI Threats
Our research team continuously monitors emerging AI security threats and attack techniques. Subscribe to our newsletter for the latest updates and defensive strategies.