Skip to main content
Suzu Logo
  • Home
  • Product
  • Our Solutions
    • AI Advisory
    • AI Assessment
    • AI Integration
    • Cybersecurity Services
  • About
    • About Us
  • Resources
    • Blog
    • In The Media
    • Podcasts
    • All Resources
Contact Us
Back to Blog
Cybersecurity Prompt Injection RAG Systems AI Security OWASP

Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs

Phillip Wylie February 12, 2026 3 min read
Table of Contents

    In today’s rapidly evolving technological landscape, the convergence of artificial intelligence (AI) and cybersecurity is becoming increasingly significant. In this episode of Simply Offensive, host Phillip Wylie converses with Mike Bell, CEO and founder of Suzu Labs, an innovative firm specializing in cybersecurity consulting and AI software. Together, they explore pressing issues in AI security and share invaluable insights for businesses looking to fortify their defenses.

    Understanding Cybersecurity in the AI Era:
    Mike Bell begins by discussing the current state of the consulting business, particularly in the fourth quarter when companies scramble to finalize budgets and secure their assets. He emphasizes the importance of maintaining an accurate inventory of applications and assets, which is crucial for effective security measures. As Bell notes, "the first thing in any security program should be an accurate asset inventory of whatever you're trying to secure."

    The Evolution of Security Threats:
    As a former military personnel with extensive experience in cyber and IT, Bell shares his journey from military service to building AI systems. He highlights the convergence of security and AI, where many companies are either focusing on one or the other. At Suzu Labs, they strive to bridge this gap, offering clients a comprehensive perspective on both fields. Bell’s technical background, reinforced by certifications like OSCP, allows him to engage deeply with both the coding and strategic aspects of cybersecurity.

    The OWASP Top 10 for LLMs:
    A significant portion of the discussion revolves around the OWASP Top 10 for Large Language Models (LLMs). Bell explains that OWASP, the Open Web Application Security Project, has developed a list of vulnerabilities that AI systems can face, which now includes prompt injection, training data poisoning, and sensitive information disclosures among others. He elaborates on the concept of prompt injection, particularly indirect prompt injection, where attackers manipulate AI behavior through crafted inputs to extract unauthorized data. This highlights the critical need for robust defenses against such vulnerabilities.

    RAG Systems and Their Vulnerabilities:
    Bell introduces the concept of Retrieval Augmented Generation (RAG), which combines vector databases with LLMs to enhance the AI's contextual understanding. However, he warns that this approach can introduce vulnerabilities, especially if the RAG database contains poisoned data. "Attackers don’t necessarily need to control the user’s input; they just need to inject poisoned data into the database," Bell explains. This emphasizes the importance of securing not just the AI model itself, but also the data it utilizes.

    Key Takeaways:
    As businesses increasingly rely on AI technologies, understanding the associated security risks becomes paramount. Maintaining a comprehensive asset inventory is essential for effective cybersecurity. The OWASP Top 10 for LLMs provides crucial guidance on potential vulnerabilities that organizations must address. Additionally, the integration of systems like RAG can enhance capabilities but also requires careful consideration of data integrity and security measures.

    Conclusion:
    In conclusion, the intersection of AI and cybersecurity presents both opportunities and challenges for organizations. As highlighted by Mike Bell, proactive measures and continuous vigilance are vital in navigating this complex landscape. By understanding the latest security threats and implementing robust strategies, businesses can better protect themselves against the evolving nature of cyber threats.

    YouTube

    Spotify

    Share
    Tags: Cybersecurity Prompt Injection RAG Systems AI Security OWASP
    Phillip Wylie
    Phillip Wylie
    ← Previous Under Armour Breach: What The Forum Data Actually Shows Next → Anthropic and Claude: 2026 AI Powerhouse

    Latest Posts

    View All
    The Company Reviewing Your Meta Glasses Footage Has a Security Problem
    Threat Intelligence
    Mar 06, 2026 Mike Bell

    The Company Reviewing Your Meta Glasses Footage Has a Security Problem

    Last week, Swedish journalists revealed that Meta sends video footage from Meta Ray-Ban smart glasses to human data ...

    Read More
    The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking
    CTF
    Mar 03, 2026 Jacob Krell

    The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking

    View White Paper Abstract: Agentic AI systems are compressing competitive hacking timelines faster than the ...

    Read More
    Anthropic and Claude: 2026 AI Powerhouse
    Supply Chain Security
    Feb 26, 2026 Hannah Perez

    Anthropic and Claude: 2026 AI Powerhouse

    In early 2026, the image of Anthropic as a cautious, safety-oriented "research lab" has effectively been replaced by ...

    Read More
    Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs
    Cybersecurity
    Feb 12, 2026 Phillip Wylie

    Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs

    In today’s rapidly evolving technological landscape, the convergence of artificial intelligence (AI) and cybersecurity ...

    Read More
    Under Armour Breach: What The Forum Data Actually Shows
    Threat Intelligence
    Jan 30, 2026 Mike Bell

    Under Armour Breach: What The Forum Data Actually Shows

    On January 18, 2026, the Everest ransomware group made good on their threat and released Under Armour customer data to ...

    Read More
    Brightspeed Breach: Crimson Collective and the Infostealer Problem
    Threat Intelligence
    Jan 20, 2026 Mike Bell

    Brightspeed Breach: Crimson Collective and the Infostealer Problem

    Recently Crimson Collective claimed they breached Brightspeed and grabbed 1 million+ customer records. The list of data ...

    Read More
    When Grid Data Goes Dark Web
    Power Grid
    Jan 19, 2026 Mike Bell

    When Grid Data Goes Dark Web

    Inside a threat actor's critical infrastructure targeting In January 2026, 139 gigabytes of engineering data from a ...

    Read More
    The $150,000 Password
    Critical Infrastructure
    Jan 19, 2026 Mike Bell

    The $150,000 Password

    How one threat actor turned stolen credentials into a global breach portfolio Between December 2025 and January 2026, a ...

    Read More
    Logo copy 3-1

    Fortified Security. Intelligent Innovation.

    +1 (702) 766-6257
    P.O. Box 750111
    Las Vegas, Nevada 89136

    Follow Us

    About

    • About Us
    • Contact

    Solutions

    • Products
    • AI Advisory
    • AI Assessment
    • Cybersecurity

    Resources

    • Insights
    • In The Media
    • Podcasts
    © 2026 All rights reserved.
    • Privacy Policy
    • Terms & Conditions