This post is part of a series about machine learning and artificial intelligence.
Adversaries often leverage supply chain attacks to gain footholds. In machine learning model deserialization issues are a significant threat, and detecting them is crucial, as they can lead to arbitrary code execution. We explored this attack with Python Pickle files in the past.
In this post we are covering backdooring the original Keras Husky AI model from the Machine Learning Attack Series, and afterwards we investigate tooling to detect the backdoor.
Some time ago i discovered the work of some researchers about SCCM, i was very interested by their research and as i reading i thought that i really need a lab to test all these cool attacks ! Thanks a lot to my colleague Issam (@KenjiEndo15), who start the project and provide me some of ansible roles to start from ! After few hours, days, weeks of install, ansible recipe creation, try and ...
This week, ESET experts released several research publications that shine the spotlight on a number of notable campaigns and broader developments on the threat landscape
Enterprise Management Associates (EMA) has published its “ Network Management Megatrends 2024” report with a focus on skills gaps, hybrid and multicloud, secure access service edge (SASE), and AI-driven operations. Since 2008, EMA has been surveying IT professionals to track and trend their approaches to managing...
Zowel de gewelddadige als de sluimerende dreiging van extremisme is een probleem van iedereen en vraagt dan ook om een gezamenlijke inspanning. Er is blijvend aandacht nodig van zowel de overheid, professionals als maatschappelijke organisaties. Alleen zo kunnen we de dreiging van extremisme het hoofd bieden. Dat staat in de eerste Nationale Extremismestrategie 2024-2029 die minister Yeşilgöz-Zegerius (Justitie en Veiligheid), minister De Jonge (Binnenlandse Zaken en Koninkrijksrelaties) en minister Van Gennip (Sociale Zaken en Werkgelegenheid) vandaag naar de Tweede Kamer hebben gestuurd.