<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Achin Bansal</title>
    <description>The latest articles on DEV Community by Achin Bansal (@bansac1981).</description>
    <link>https://dev.to/bansac1981</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3885738%2F82003f2a-084c-4b4a-a4c9-dfa109745be9.png</url>
      <title>DEV Community: Achin Bansal</title>
      <link>https://dev.to/bansac1981</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/bansac1981"/>
    <language>en</language>
    <item>
      <title>OWASP GenAI Security Project Gets Update, New Tools Matrix</title>
      <dc:creator>Achin Bansal</dc:creator>
      <pubDate>Sat, 18 Apr 2026 12:50:30 +0000</pubDate>
      <link>https://dev.to/bansac1981/owasp-genai-security-project-gets-update-new-tools-matrix-2pnd</link>
      <guid>https://dev.to/bansac1981/owasp-genai-security-project-gets-update-new-tools-matrix-2pnd</guid>
      <description>&lt;h3&gt;
  
  
  Forensic Summary
&lt;/h3&gt;

&lt;p&gt;OWASP has updated its GenAI Security Project to formally recognise 21 generative AI risks, releasing a new tools matrix to help organisations structure their defences. The update notably distinguishes between securing traditional GenAI systems and the emerging attack surface presented by agentic AI architectures. This guidance represents a significant standards-level acknowledgement that agentic AI requires its own dedicated security posture.&lt;/p&gt;




&lt;p&gt;Read the full technical deep-dive on &lt;strong&gt;Grid the Grey&lt;/strong&gt;: &lt;a href="https://gridthegrey.com/posts/owasp-genai-security-project-gets-update-new-tools-matrix/" rel="noopener noreferrer"&gt;https://gridthegrey.com/posts/owasp-genai-security-project-gets-update-new-tools-matrix/&lt;/a&gt; &lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>ai</category>
      <category>automation</category>
    </item>
    <item>
      <title>OpenAI Impacted by North Korea-Linked Axios Supply Chain Hack</title>
      <dc:creator>Achin Bansal</dc:creator>
      <pubDate>Sat, 18 Apr 2026 12:42:05 +0000</pubDate>
      <link>https://dev.to/bansac1981/openai-impacted-by-north-korea-linked-axios-supply-chain-hack-ok9</link>
      <guid>https://dev.to/bansac1981/openai-impacted-by-north-korea-linked-axios-supply-chain-hack-ok9</guid>
      <description>&lt;h3&gt;
  
  
  Forensic Summary
&lt;/h3&gt;

&lt;p&gt;OpenAI has been impacted by a supply chain attack attributed to North Korea-linked threat actors, involving a compromised macOS code signing certificate associated with the Axios JavaScript library. The incident highlights the vulnerability of major AI platforms to upstream software supply chain compromises, which could expose users to malicious code distributed through trusted tooling. As a leading AI infrastructure provider, any compromise of OpenAI's build or distribution pipeline carries significant downstream risk for enterprises relying on its models and APIs.&lt;/p&gt;




&lt;p&gt;Read the full technical deep-dive on &lt;strong&gt;Grid the Grey&lt;/strong&gt;: &lt;a href="https://gridthegrey.com/posts/openai-impacted-by-north-korea-linked-axios-supply-chain-hack/" rel="noopener noreferrer"&gt;https://gridthegrey.com/posts/openai-impacted-by-north-korea-linked-axios-supply-chain-hack/&lt;/a&gt; &lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>ai</category>
      <category>automation</category>
    </item>
  </channel>
</rss>
