Innovation Hub

AI Threat Landscape Report 2025

MCP and the Shift to AI Systems

Securing AI in the Shift from Models to Systems Artificial intelligence has evolved from controlled workflows to fully connected systems. With the rise of the Model Context Protocol (MCP) and autonomous AI agents, enterprises are building intelligent ecosystems that connect models directly to tools, data sources, and workflows. This shift accelerates innovation but also exposes […]

The Lethal Trifecta and How to Defend Against It

Introduction: The Trifecta Behind the Next AI Security Crisis In June 2025, software engineer and AI researcher Simon Willison described what he called “The Lethal Trifecta” for AI agents: “Access to private data, exposure to untrusted content, and the ability to communicate externally.Together, these three capabilities create the perfect storm for exploitation through prompt injection […]

Reports and Guides

AI Threat Landscape Report 2025

Download your copy of HiddenLayer's 2025 AI Threat Landscape Report to learn more about evolving AI vulnerabilities and how securing AI can fuel your organization's innovation

Reports & Guides

Securing AI: The Technology Playbook

AI Threat Landscape Report 2025

HiddenLayer Named a Cool Vendor in AI Security

SAI Security Advisory

CVE-2024-0129

NVIDIA NeMo Vulnerability Report

An attacker can craft a malicious model containing a path traversal and share it with a victim. If the victim uses an Nvidia NeMo version prior to r2.0.0rc0 and loads the malicious model, arbitrary files may be written to disk. This can result in code execution and data tampering.

CVE-2024-24590

Pickle Load on Artifact Get Leading to Code Execution

An attacker can create a pickle file containing arbitrary code and upload it as an artifact to a Project via the API. When a victim user calls the get method within the Artifact class to download and load a file into memory, the pickle file is deserialized on their system, running any arbitrary code it contains.

CVE-2024-24591

Path Traversal on File Download Leading to Arbitrary Write

An attacker can upload or modify a dataset containing a link pointing to an arbitrary file and a target file path. When a user interacts with this dataset, such as when using the Dataset.squash method, the file is written to the target path on the user’s system.

CVE-2024-24592

Improper Auth Leading to Arbitrary Read-Write Access

An attacker can, due to lack of authentication, arbitrarily upload, delete, modify, or download files on the fileserver, even if the files belong to another user.

CVE-2024-24593

Cross-site Request Forgery in ClearML Server

An attacker can craft a malicious web page that triggers a CSRF when visited. When a user browses to the malicious web page a request is sent which can allow an attacker to fully compromise a user’s account.

HiddenLayer in the News

HiddenLayer Unveils AISec Platform 2.0 to Deliver Unmatched Context, Visibility, and Observability for Enterprise AI Security

Austin, TX – April 22, 2025 – HiddenLayer, the leading provider of security for AI models and assets, today announced the release of AISec Platform 2.0, the platform with the most context, intelligence, and data for securing AI systems across the entire development and deployment lifecycle. Unveiled ahead of the RSAC Conference 2025, this upgrade […]

Cyera and HiddenLayer Announce Strategic Partnership to Deliver End-to-End AI Security

AUSTIN, Texas – April 23, 2025 – HiddenLayer, the leading security provider for AI models and assets, and Cyera, the pioneer in AI-native data security, today announced a strategic partnership to deliver end-to-end protection for the full AI lifecycle from the data that powers them to the models that drive innovation. As enterprises embrace AI […]

One Prompt Can Bypass Every Major LLM’s Safeguards