all InfoSec news
Topic: llms
Episode 242 - LLMs Exploiting Vulns, State of DevSecOps
2 days, 15 hours ago |
absoluteappsec.com
Protecting Your LLMs with Information Bottleneck
3 days, 5 hours ago |
arxiv.org
AI’s use as a hacking tool has been overhyped
3 days, 19 hours ago |
www.itpro.com
Unlocking Business Potential: The Power of Custom LLMs
6 days, 18 hours ago |
systemweakness.com
Giskard: LLM-Assisted Automated Red Teaming
1 week, 1 day ago |
dev.to
LLM Security: Using Automated Tools for Vulnerability Scans
1 week, 2 days ago |
dev.to
Episode 241 - Secure Defaults, Using LLMs for Code Review
1 week, 2 days ago |
absoluteappsec.com
Exploring LLM RAG Application Vulnerabilities
1 week, 3 days ago |
dev.to
LLM Agents can Autonomously Exploit One-day Vulnerabilities
1 week, 4 days ago |
arxiv.org
Should We Just Accept the Lies We Get From AI Chatbots?
2 weeks, 1 day ago |
www.govinfosecurity.com
Should We Just Accept the Lies We Get From AI Chatbots?
2 weeks, 1 day ago |
www.bankinfosecurity.com
Absolute AppSec Ep. #240 - Code Smells, XZ Backdoor, Hallucinations
2 weeks, 2 days ago |
www.youtube.com
Take a Look at it! Rethinking How to Evaluate Language Model Jailbreak
2 weeks, 2 days ago |
arxiv.org
Episode 240 - Code Smells, XZ Backdoor, Hallucinations
2 weeks, 2 days ago |
absoluteappsec.com
Increased LLM Vulnerabilities from Fine-tuning and Quantization
2 weeks, 3 days ago |
arxiv.org
Technical Advisory – Ollama DNS Rebinding Attack (CVE-2024-28224)
2 weeks, 3 days ago |
research.nccgroup.com
Vocabulary Attack to Hijack Large Language Model Applications
3 weeks, 1 day ago |
arxiv.org
Exploring Backdoor Vulnerabilities of Chat Models
3 weeks, 1 day ago |
arxiv.org
How Effective Are Neural Networks for Fixing Security Vulnerabilities
3 weeks, 2 days ago |
arxiv.org
Episode 242 - LLMs Exploiting Vulns, State of DevSecOps
2 days, 15 hours ago |
absoluteappsec.com
Unlocking Business Potential: The Power of Custom LLMs
6 days, 18 hours ago |
systemweakness.com
Protecting Your LLMs with Information Bottleneck
3 days, 5 hours ago |
arxiv.org
AI’s use as a hacking tool has been overhyped
3 days, 19 hours ago |
www.itpro.com
Items published with this topic over the last 90 days.
Latest
Episode 242 - LLMs Exploiting Vulns, State of DevSecOps
2 days, 15 hours ago |
absoluteappsec.com
Protecting Your LLMs with Information Bottleneck
3 days, 5 hours ago |
arxiv.org
AI’s use as a hacking tool has been overhyped
3 days, 19 hours ago |
www.itpro.com
Unlocking Business Potential: The Power of Custom LLMs
6 days, 18 hours ago |
systemweakness.com
Giskard: LLM-Assisted Automated Red Teaming
1 week, 1 day ago |
dev.to
LLM Security: Using Automated Tools for Vulnerability Scans
1 week, 2 days ago |
dev.to
Episode 241 - Secure Defaults, Using LLMs for Code Review
1 week, 2 days ago |
absoluteappsec.com
Exploring LLM RAG Application Vulnerabilities
1 week, 3 days ago |
dev.to
LLM Agents can Autonomously Exploit One-day Vulnerabilities
1 week, 4 days ago |
arxiv.org
Should We Just Accept the Lies We Get From AI Chatbots?
2 weeks, 1 day ago |
www.govinfosecurity.com
Should We Just Accept the Lies We Get From AI Chatbots?
2 weeks, 1 day ago |
www.bankinfosecurity.com
Absolute AppSec Ep. #240 - Code Smells, XZ Backdoor, Hallucinations
2 weeks, 2 days ago |
www.youtube.com
Take a Look at it! Rethinking How to Evaluate Language Model Jailbreak
2 weeks, 2 days ago |
arxiv.org
Episode 240 - Code Smells, XZ Backdoor, Hallucinations
2 weeks, 2 days ago |
absoluteappsec.com
Increased LLM Vulnerabilities from Fine-tuning and Quantization
2 weeks, 3 days ago |
arxiv.org
Technical Advisory – Ollama DNS Rebinding Attack (CVE-2024-28224)
2 weeks, 3 days ago |
research.nccgroup.com
Vocabulary Attack to Hijack Large Language Model Applications
3 weeks, 1 day ago |
arxiv.org
Exploring Backdoor Vulnerabilities of Chat Models
3 weeks, 1 day ago |
arxiv.org
How Effective Are Neural Networks for Fixing Security Vulnerabilities
3 weeks, 2 days ago |
arxiv.org
Topic trend (last 90 days)
Top (last 7 days)
Episode 242 - LLMs Exploiting Vulns, State of DevSecOps
2 days, 15 hours ago |
absoluteappsec.com
Unlocking Business Potential: The Power of Custom LLMs
6 days, 18 hours ago |
systemweakness.com
Protecting Your LLMs with Information Bottleneck
3 days, 5 hours ago |
arxiv.org
AI’s use as a hacking tool has been overhyped
3 days, 19 hours ago |
www.itpro.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Cyber Security Cloud Solution Architect
@ Microsoft | London, London, United Kingdom
Compliance Program Analyst
@ SailPoint | United States
Software Engineer III, Infrastructure, Google Cloud Security and Privacy
@ Google | Sunnyvale, CA, USA
Cryptography Expert
@ Raiffeisen Bank Ukraine | Kyiv, Kyiv city, Ukraine
Senior Cyber Intelligence Planner (15.09)
@ OCT Consulting, LLC | Washington, District of Columbia, United States