all InfoSec news
Tensorflow Supply Chain Compromise via Self-Hosted Runner Attack
Security Boulevard securityboulevard.com
Introduction With the recent rise and adoption of artificial intelligence technologies, open-source frameworks such as TensorFlow are prime targets for attackers seeking to conduct software supply chain attacks. Over the last several years, Praetorian engineers have become adept at performing highly complex attacks on GitHub Actions CI/CD environments, designing proprietary tools to aid their attacks, […]
The post Tensorflow Supply Chain Compromise via Self-Hosted Runner Attack appeared first on Praetorian.
The post Tensorflow Supply Chain Compromise via Self-Hosted Runner …
actions adoption artificial artificial intelligence attack attackers attacks complex attacks compromise engineers environments frameworks github github actions intelligence introduction performing praetorian prime software software supply chain software supply chain attacks supply supply chain supply chain attacks supply chain compromise technologies tensorflow tools