As AI systems become increasingly integrated into critical workflows, their attack surface grows in complexity. Models can be exploited at different stages: training, deployment, and interaction, making it essential for security professionals to unde...