GenAI Poisoning: How Fewer Than 100 Samples Can Corrupt a Multi-Billion Parameter Model
pub.towardsai.net·1d
🦠Malware Analysis
Flag this post
Registry Analysis
🦠Malware Analysis
Flag this post
A systems-theoretic approach for identifying security vulnerabilities in machine learning-enhanced industrial control systems
sciencedirect.com·1h
🔐Cybersecurity
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.com·2d
🧱Firewalls
Flag this post
What Security Teams Need to Know as PHP and IoT Exploits Surge
blog.qualys.com·2d
🔐Cybersecurity
Flag this post
Ask HN: Do professional photographers need hardware-level image authentication?
🔒TLS/SSL
Flag this post
Evading AV and EDR solutions
🦠Malware Analysis
Flag this post
Shadow IT is threatening businesses from within - and today’s security tools simply can’t keep up
techradar.com·12h
🔐Cybersecurity
Flag this post
HTTP desync attacks: request smuggling reborn
🔒TLS/SSL
Flag this post
Relevant — TryHackMe Room Walkthrough
infosecwriteups.com·2d
🔬Reverse Engineering
Flag this post
Secretly Loyal AIs: Threat Vectors and Mitigation Strategies
lesswrong.com·22h
🔐Cybersecurity
Flag this post
Protect Your Accounts: Essential Tips to Avoid Hacking Disasters
howtogeek.com·1d
🔐Cybersecurity
Flag this post
Oops, My UUIDs Collided
🔐Cybersecurity
Flag this post
Finding the Master Keys: How to Hunt Malicious Client Secrets in M365
guidepointsecurity.com·1d
🔬Reverse Engineering
Flag this post
Security Doesn’t Have to Hurt
docker.com·1d
🔐Cybersecurity
Flag this post
CrowdStrike & NVIDIA’s open source AI gives enterprises the edge against machine-speed attacks
venturebeat.com·20h
🧱Firewalls
Flag this post
Loading...Loading more...