This post is part of a series about machine learning and artificial intelligence.
Adversaries often leverage supply chain attacks to gain footholds. In machine learning model deserialization issues are a significant threat, and detecting them is crucial, as they can lead to arbitrary code execution. We explored this attack with Python Pickle files in the past.
In this post we are covering backdooring the original Keras Husky AI model from the Machine Learning Attack Series, and afterwards we investigate tooling to detect the backdoor.
Some time ago i discovered the work of some researchers about SCCM, i was very interested by their research and as i reading i thought that i really need a lab to test all these cool attacks ! Thanks a lot to my colleague Issam (@KenjiEndo15), who start the project and provide me some of ansible roles to start from ! After few hours, days, weeks of install, ansible recipe creation, try and ...
This week, ESET experts released several research publications that shine the spotlight on a number of notable campaigns and broader developments on the threat landscape
Enterprise Management Associates (EMA) has published its “ Network Management Megatrends 2024” report with a focus on skills gaps, hybrid and multicloud, secure access service edge (SASE), and AI-driven operations. Since 2008, EMA has been surveying IT professionals to track and trend their approaches to managing...