Amit Sidesamitsides.hashnode.dev·Nov 13, 2024AI & Cyber Security: Exploiting Insights from High-Dimensional Vectors SpacesIntroduction ( Quick note on Article focus: not on the HOW vector embeddings are generated but the WHAT capabilities of these representations per se in cybersecurity) Many modern machine learning and deep learning algorithms, such as neural networks,...Discuss#cybersecurity
Nagen Kthinkboundlessai.hashnode.dev·Nov 5, 2024Securing Large Language Models: An Overview of Common Security PracticesWith the explosion of Large Language Models (LLMs) like GPT and BERT, these tools are now everywhere—from customer service chatbots to complex automation tasks. But as powerful as LLMs are, they’re also packed with vulnerabilities that can be exploit...DiscussAI
Darshan Patildarshan-ptl.hashnode.dev·Sep 23, 2024AI-powered patching: the future of automated vulnerability fixes - Research Paper NotesHow has Google managed to fix 15% of its sanitizer bugs in the code using AI?As AI continues to improve rapidly, it has also developed the ability to find security bugs in the code, every time it finds a vulnerability, its as opportunity to fix. Lets...Discuss·28 readspatching
John GambleforPangea Blogpangea.cloud·Sep 19, 2024Where AI-Powered Software is Going, We Need Secure, Paved RoadsDo you remember when and where you first used an AI-powered product that caused you to question reality? I do. In the spring of 2022, I tested a synthetic text-to-voice app that was so uncannily realistic that I briefly questioned if it was truly AI ...Discuss·191 readsAI
Rosecurifylog.rosecurify.com·Sep 8, 2024Seclog - #90"Never let your enemy know your next move, especially if it's turning the router off and on again." - The Art of Cyber War 📚 SecMisc Living Off the Living Off the Land | LOLOL - A resource for living off the land techniques - Read More shell.how ...Discussseclogseclog
Christopher Akintoyechristopher-akintoye.hashnode.dev·Aug 20, 2024The Rise of AI-Powered Cybersecurity Threats:Introduction The field of cybersecurity changes daily in the current superconnected world. In today's rapidly changing times, with advancing technology, there is an equal advance in the methods and measures used by cybercriminals to rob businesses bl...Discuss·2 likes#cybersecurity
Abhiramcloudbuddy.hashnode.dev·Jul 19, 2024Generative AI and Cloud Security Orchestration: Conducting the Security SymphonyThe cloud has revolutionized how businesses operate, offering unparalleled scalability, agility, and cost-effectiveness. However, this digital haven comes with a significant responsibility: security. Securing cloud environments is a complex task, req...Discusscloud security
Abhiramcloudbuddy.hashnode.dev·Jul 19, 2024The Cat-and-Mouse Game: Generative AI in Adversarial Security for the CloudThe cloud has become the cornerstone of modern technology, offering unparalleled scalability, agility, and cost-effectiveness for businesses of all sizes. However, this digital haven also presents a significant challenge: security. In the cloud, a co...Discussai security
Rosecurifylog.rosecurify.com·Jul 13, 2024Seclog - #82📚 SecMisc beaconDB - An advanced database for security researchers and analysts. Read More BLAST RADIUS - A platform focused on visualizing and understanding the impact of security breaches. Read More Deep-ML - A cutting-edge tool leveraging deep...Discuss·1 likeseclogSecurity
Abhiramcloudbuddy.hashnode.dev·Jul 12, 2024From Chaos to Cosmos: How Generative AI Can Automate Threat Detection in the CloudThe cloud has become the lifeblood of modern businesses. From housing mission-critical applications to storing sensitive data, organizations are increasingly reliant on cloud infrastructure. But with this convenience comes a growing challenge: securi...DiscussThreatDetection