Unveiling The Applications and Distinctions of Machine Learning and Artificial Intelligence in Cybersecurity

Unveiling The Applications and Distinctions of Machine Learning and Artificial Intelligence in Cybersecurity

The terms "machine learning" and "artificial intelligence" are frequently used in cybersecurity, often interchangeably, leading to confusion about their precise meanings and applications. Both machine learning and artificial intelligence play pivotal roles ...
Pickle overlaying Python code snippet for the fickling tool

Relishing new Fickling features for securing ML systems

By Suha S. Hussain We’ve added new features to Fickling to offer enhanced threat detection and analysis across a broad spectrum of machine learning (ML) workflows. Fickling is a decompiler, static analyzer, ...

Our response to the US Army’s RFI on developing AIBOM tools

| | machine learning
By Michael Brown and Adelin Travers The US Army’s Program Executive Office for Intelligence, Electronic Warfare and Sensors (PEO IEW&S) recently issued a request for information (RFI) on methods to implement and ...
encrypted AI Trend Micro cybersecurity poverty line, data-centric, SUSE cloud Wiz Torq AirTag Skyhawk SASE security cloud security visibility PwC Survey Finds C-Level Execs Now View Cybersecurity as Biggest Risk

The Cybersecurity Horizon: AI, Resilience and Collaboration in 2024

As we peer into the future, it is imperative to acknowledge the profound impact that artificial intelligence (AI) is having on the cybersecurity arena ...
Security Boulevard

Celebrating our 2023 open-source contributions

At Trail of Bits, we pride ourselves on making our best tools open source, such as Slither, PolyTracker, and RPC Investigator. But while this post is about open source, it’s not about ...

Poisoning AI Models

New research into poisoning AI models: The researchers first trained the AI models using supervised learning and then used additional “safety training” methods, including more supervised learning, reinforcement learning, and adversarial training ...
Microsoft AI cybersecurity

Protect AI Report Surfaces MLflow Security Vulnerabilities

Protect AI identified RCE vulnerabilities in the MLflow life cycle management tool that can be used to compromise AI models ...
Security Boulevard
Our thoughts on AIxCC’s competition format

Our thoughts on AIxCC’s competition format

By Michael Brown Late last month, DARPA officially opened registration for their AI Cyber Challenge (AIxCC). As part of the festivities, DARPA also released some highly anticipated information about the competition: a ...
LeftoverLocals Vulnerability: Listening to LLM responses through leaked GPU local memory

LeftoverLocals: Listening to LLM responses through leaked GPU local memory

By Tyler Sorensen and Heidy Khlaaf We are disclosing LeftoverLocals: a vulnerability that allows recovery of data from GPU local memory created by another process on Apple, Qualcomm, AMD, and Imagination GPUs ...

Sift’s innovative journey: 40 patents and counting in the fight against evolving online fraud through AI, machine learning, and Workflows

Sift has been granted 40 patents by the United States Patent and Trademark Office, protecting digital businesses and their customers from evolving fraud. The post Sift’s innovative journey: 40 patents and counting ...