threat models
Regulating AI Behavior with a Hypervisor
Interesting research: “Guillotine: Hypervisors for Isolating Malicious AIs.” Abstract:As AI models become more embedded in critical sectors like finance, healthcare, and the military, their inscrutable behavior poses ever-greater risks to society. To ...

SeedPod Cyber and Seceon Join Forces to Offer Cybersecurity Solutions and CyberInsurance Savings for MSP/MSSPs
Seceon's MSP and MSSP Partners Gain Exclusive Cyber Insurance and Unmatched Savings for Excellence in Cybersecurity Standards.................. The post SeedPod Cyber and Seceon Join Forces to Offer Cybersecurity Solutions and CyberInsurance Savings ...
Poisoning AI Models
New research into poisoning AI models: The researchers first trained the AI models using supervised learning and then used additional “safety training” methods, including more supervised learning, reinforcement learning, and adversarial training ...

Seceon to Participate In AGC Partners’ 2017 Boston Technology Growth Conference
Seceon will again be participating with AGC Partners in its 14th Annual Boston Technology Growth Conference to be held on Thursday, November 9th. The AGC Partner Conference is a premier showcase for fast ...

Seceon to Participate In AGC Partners’ 2017 Boston Technology Growth Conference
Seceon will again be participating with AGC Partners in its 14th Annual Boston Technology Growth Conference to be held on Thursday, November 9th. The AGC Partner Conference is a premier showcase for fast ...
Security Analysis of Threema
A group of Swiss researchers have published an impressive security analysis of Threema. We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users ...
Threats of Machine-Generated Text
With the release of ChatGPT, I’ve read many random articles about this or that threat from the technology. This paper is a good survey of the field: what the threats are, how ...
New Sophisticated Malware
Mandiant is reporting on a new botnet. The group, which security firm Mandiant is calling UNC3524, has spent the past 18 months burrowing into victims’ networks with unusual stealth. In cases where ...
Bunnie Huang’s Plausibly Deniable Database
Bunnie Huang has created a Plausibly Deniable Database. Most security schemes facilitate the coercive processes of an attacker because they disclose metadata about the secret data, such as the name and size ...

Best Intelligent SIEM Vendor
Best Intelligent SIEM Vendor - Seceon SIEM tools help you simplify compliance reporting, with better access and visibility into networks, and high scalability. Nowadays, cyber-attacks are common than one can comprehend. With ...