Jan. 14, 2024, 1:36 p.m. | Nathan Sportsman

Security Boulevard securityboulevard.com

Introduction With the recent rise and adoption of artificial intelligence technologies, open-source frameworks such as TensorFlow are prime targets for attackers seeking to conduct software supply chain attacks. Over the last several years, Praetorian engineers have become adept at performing highly complex attacks on GitHub Actions CI/CD environments, designing proprietary tools to aid their attacks, […]


The post Tensorflow Supply Chain Compromise via Self-Hosted Runner Attack appeared first on Praetorian.


The post Tensorflow Supply Chain Compromise via Self-Hosted Runner …

actions adoption artificial artificial intelligence attack attackers attacks complex attacks compromise engineers environments frameworks github github actions intelligence introduction performing praetorian prime software software supply chain software supply chain attacks supply supply chain supply chain attacks supply chain compromise technologies tensorflow tools

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Principal Security Researcher (Advanced Threat Prevention)

@ Palo Alto Networks | Santa Clara, CA, United States

EWT Infosec | IAM Technical Security Consultant - Manager

@ KPMG India | Bengaluru, Karnataka, India

Security Engineering Operations Manager

@ Gusto | San Francisco, CA; Denver, CO; Remote

Network Threat Detection Engineer

@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC