Darshan Patildarshan-ptl.hashnode.dev·Sep 23, 2024AI-powered patching: the future of automated vulnerability fixes - Research Paper NotesHow has Google managed to fix 15% of its sanitizer bugs in the code using AI?As AI continues to improve rapidly, it has also developed the ability to find security bugs in the code, every time it finds a vulnerability, its as opportunity to fix. Lets...Discusspatching
John GambleforPangea Blogpangea.cloud·Sep 19, 2024Where AI-Powered Software is Going, We Need Secure, Paved RoadsDo you remember when and where you first used an AI-powered product that caused you to question reality? I do. In the spring of 2022, I tested a synthetic text-to-voice app that was so uncannily realistic that I briefly questioned if it was truly AI ...Discuss·135 readsAI
Rosecurifylog.rosecurify.com·Sep 8, 2024Seclog - #90"Never let your enemy know your next move, especially if it's turning the router off and on again." - The Art of Cyber War 📚 SecMisc Living Off the Living Off the Land | LOLOL - A resource for living off the land techniques - Read More shell.how ...Discussseclogseclog
Christopher Akintoyechristopher-akintoye.hashnode.dev·Aug 20, 2024The Rise of AI-Powered Cybersecurity Threats:Introduction The field of cybersecurity changes daily in the current superconnected world. In today's rapidly changing times, with advancing technology, there is an equal advance in the methods and measures used by cybercriminals to rob businesses bl...Discuss·2 likes#cybersecurity
Abhiramcloudbuddy.hashnode.dev·Jul 19, 2024Generative AI and Cloud Security Orchestration: Conducting the Security SymphonyThe cloud has revolutionized how businesses operate, offering unparalleled scalability, agility, and cost-effectiveness. However, this digital haven comes with a significant responsibility: security. Securing cloud environments is a complex task, req...Discusscloud security
Abhiramcloudbuddy.hashnode.dev·Jul 19, 2024The Cat-and-Mouse Game: Generative AI in Adversarial Security for the CloudThe cloud has become the cornerstone of modern technology, offering unparalleled scalability, agility, and cost-effectiveness for businesses of all sizes. However, this digital haven also presents a significant challenge: security. In the cloud, a co...Discussai security
Rosecurifylog.rosecurify.com·Jul 13, 2024Seclog - #82📚 SecMisc beaconDB - An advanced database for security researchers and analysts. Read More BLAST RADIUS - A platform focused on visualizing and understanding the impact of security breaches. Read More Deep-ML - A cutting-edge tool leveraging deep...Discuss·1 likeseclogSecurity
Abhiramcloudbuddy.hashnode.dev·Jul 12, 2024From Chaos to Cosmos: How Generative AI Can Automate Threat Detection in the CloudThe cloud has become the lifeblood of modern businesses. From housing mission-critical applications to storing sensitive data, organizations are increasingly reliant on cloud infrastructure. But with this convenience comes a growing challenge: securi...DiscussThreatDetection
MLSecured BlogforBlogblog.mlsecured.com·Jun 14, 2024AI Without Compromise: Mastering LLM Deployment with MLSecured🥷🤓Introduction🤖 As enterprises increasingly adopt large language models (LLMs) to enhance their operations, the journey from development to production often presents numerous challenges. Despite their promising capabilities, deploying LLMs in real-wor...Discussai security
Raicode.flatmarstheory.com·Jun 1, 2024Data Poisoning in AIAs Artificial Intelligence (AI) systems become more prevalent in various sectors, the integrity of the data used to train these systems is paramount. One of the emerging threats to AI models is data poisoning, a malicious attack that aims to corrupt ...DiscussData Poisoning