EMA IT & Data Management Research, Industry Analysis & Consulting

Cybersecurity Awesomeness Podcast Recap – Episode 134: LLM Prompt Injection Attacks

Nov 17, 2025 8:17:44 AM

Welcome to the recap of the Enterprise Management Associates (EMA) Cybersecurity Awesomeness (CSA) Podcast. Hosted by Chris Steffen, vice president of research, and Ken Buckler, research director at EMA, the CSA Podcast covers a wide range of cybersecurity topics, from cyber workforce talent shortages to cyber threat intelligence, to current events in technology and security. This short, laid-back podcast is for listeners of all skill levels and backgrounds.

In this episode of the Cybersecurity Awesomeness Podcast, hosted by Chris Steffen and featuring industry expert Ken Buckler, listeners are introduced to the cutting-edge threats posed by AI technologies, particularly concerning prompt injection attacks associated with large language models (LLMs). As IT practitioners and decision-makers know, understanding these vulnerabilities is paramount—not just for safeguarding sensitive data but for ensuring the integrity of AI systems themselves.

The discussion begins with an alarming premise: cybersecurity professionals are confronted with threats today that weren’t even on their radar just a year or two ago. Ken Buckler articulates this shift, highlighting how attackers no longer need extensive access credentials to exploit systems; instead, they can simply pose clever queries to AI systems that have been designed to assist users. Such ease of access underscores the importance of robust security measures, given that AI applications are often trained to be helpful by interpreting user prompts literally. This can lead to significant data leaks if individuals with malicious intent exploit these systems through creative prompting, resulting in prompt injection attacks.

As the podcast unfolds, Buckler discusses the historical context of identity-focused attacks, emphasizing the evolution of vulnerabilities from user credentials to the very prompts given to AI systems. The conversation touches on the necessity for businesses implementing AI to rethink their security frameworks. For instance, there is now a pressing need to establish 'guardrails'—protective measures that ensure AI systems only respond to properly credentialed users and under defined conditions. Without these regulations, systems risk being excessively helpful, inadvertently granting unfettered access to sensitive data.

Buckler also illustrates these concepts with real-world examples, such as the recent introduction of an AI-powered web browser by Perplexity. This technology can summarize webpage content based on user commands, but it reveals the potential for dangerous prompt injections if malicious input is hidden within web pages. This alarming capability could lead to unwitting actions taken by the AI—such as submitting transactions on behalf of users or bypassing critical security protocols.

Throughout this engrossing discussion, the podcast doesn’t shy away from addressing the “old school” attacks still prevalent in the cybersecurity realm. Buckler expresses concerns that with the focus on LLM vulnerabilities, traditional threats like DDoS attacks and SQL injections may receive less attention, potentially leaving organizations exposed. One critical takeaway is the need for practitioners to maintain a balanced perspective; while the new threats of AI require immediate focus, they must not overshadow the ongoing risks posed by legacy attack vectors.

The Cybersecurity Awesomeness Podcast’s latest episode serves as a call for IT professionals to adapt to the rapid advancements in AI while simultaneously anchoring their strategies in time-tested cybersecurity fundamentals. These challenges demand vigilance, innovation, and collaboration within the cybersecurity community. We invite you to listen to the full podcast for a deeper exploration of these urgent topics and practical strategies that enterprises can leverage to bolster their defenses in an AI-driven world. For more insights and valuable research, visit enterprisemanagement.com. Stay informed and prepared for the future of cybersecurity.

Chris Steffen & Ken Buckler

Written by Chris Steffen & Ken Buckler

Christopher Steffen, CISSP, CISA, is the vice president of research at EMA, covering information security, risk, and compliance management. Before EMA, he served as the CIO for a financial services firm, focusing on FedRAMP compliance and security. He has also served in executive and leadership roles in numerous industry verticals. Steffen has presented at numerous industry conferences and has been interviewed by multiple online and print media sources. Steffen holds over a dozen technical certifications, including CISSP and CISA.

Kenneth Buckler, CASP, is a research director of information security/risk and compliance management for Enterprise Management Associates, a leading industry analyst and consulting firm that provides deep insight across the full spectrum of IT and data management technologies. Before EMA, he supported a Federal agency’s Enterprise Visibility program, providing security insights and compliance trending for the agency’s national network of computers and devices. He has also served in technical hands-on roles across multiple agencies in the Federal cyber security space and has published three Cyber Security books. Ken holds multiple technical certifications, including CompTIA’s Advanced Security Practitioner (CASP) certification.

  • There are no suggestions because the search field is empty.

Lists by Topic

see all

Posts by Topic

see all

Recent Posts